A NEW APPROACH TO IDENTIFY THE STEGNO IMAGE USING EIGEN VALUE AND EIGEN VECTOR METHOD
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 3
Abstract
In this paper we propose a new BMP based Steganography image identification using Eigen values and Eigen Vectors Technique. This is new approach and this method is different from normal and Steganography image comparison, the steganography technique is normally based on BMP images by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of steganography image identification using Eigen values and Eigen Vectors Technique. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Authors and Affiliations
Dr. S. S Dinakaran#1, M. Sc. , M. Phil. , Ph. D. , A. Ruby#
Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing
Cognitive radio is an emerging technology that aims for efficient spectrum usage. Cognitive radios have been proposed as a solution to the spectrum underutilization problem and have been proven to increase spec...
A Survey on Improving the Clustering Performance in Text Mining for Efficient Information Retrieval
In recent years, the development of information systems in every field such as business, academics and medicine has led to increase in the amount of stored data year by year. A vast majority of data are stored in documen...
An Analysis on Implementation of Leach Protocol
Wireless sensor network consists of set of sensor nodes which is widely used in monitoring purposes. In order to increase the wireless sensor network life time various protocol was developed. In this paper presents a com...
Performance Improvement in OFDM System with Interleaving and Blanking over Impulse Noise Environment
OFDM is a relatively new way to the field of digital communication but is finding more and more use due to its high spectral efficiency and robustness against interfering signal. Impulse noise is one of the major factors...
Application of Least Squares Parameter Estimation Techniques in Fault Detection
Failure detection has been the subject of many studies in the past. Modern technology has required highly complex dynamic systems. A critical system is any system whose ‘failure’ could threaten the system’s environ...