Image Steganography Based On Optimal LSB Pixel Adjustment Method
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 1
Abstract
Now a days, internet becomes major channel for communicating information one place to other such as text, image, audio, video data. Steganography is a technique in which information can to be communicating secretly by hiding in another such as secondary information with changing its significance. This paper presents a new approach of image steganography using polynomial based optimal LSB and pixel adjustment method. This method main focus on adaptiveness of LSB’s replacement and pixel adjustment for improving the capacity of hiding data and robustness of steganography. Objective analysis is done over the proposed method using MSE, PSNR and Normalized correlation method.
Authors and Affiliations
Gowtham Prasad T V S, Dr. S Varadarajan, Dr. S. A. K Jilani, Dr. G N Kodandaramaiah
Smallest Univalue Segment Assimilating Nucleus approach to Brain MRI Image Segmentation using Fuzzy C-Means and Fuzzy K-Means Algorithms
Image segmentation still remains an important task in image processing and analysis. Sequel to any segmentation process, preprocessing activities carried out on the images have a great effect on the accuracy of the segme...
Global Prediction algorithms and predictability of anomalous points in a time series
The Indian Ocean Dipole (IOD) event of 1997 had significant impacts on regional climate variability as it produced large Sea Surface Temperature (SST) anomalies in the Indian Ocean (IO). This dipole mode accounted for ab...
Performance Of Modified Cosh Window Function
In this paper, we have analyzed the performance of modified Cosh window function.A new parameter has been proposed to the previous 2-parameter Cosh window to improve its spectral characteristics in terms of ripple-ratio...
PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN
Wireless ad-hoc networks are vulnerable to various kinds of security threats and attacks due to relative ease of access to wireless medium and lack of a centralized infrastructure. Security is an alarming concern, as eve...
IMPLEMENTING A NEW ALGORITHM FOR ANALYSIS OF PROTOCOL EFFICIENCY USING STABILITY AND DELAY TRADEOFF IN MANET
In this paper, we present an extensive ns-2.33 simulation basedperformance comparison of four widely known stability-orientedon-demand Mobile Adhoc Network (MANET) routingprotocols. Our simulations show that modified Pow...