A Secure Data Hiding Scheme In Images Using Random Generated Key
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data hiding is the process of transmitting images in a hidden manner, where as the message should be invisible to the unauthorized users. This technique is a good way to achieve the secret delivery of data, where the colour image acts as a popular cover media to send the secret. The commonly used data hiding technique are based on block truncation coding and complementary Error Diffused Block Truncation Coding. Block Truncation Coding is a type lossy image compression technique for grey scale images. It divide the original image into blocks and then use a quantizer to reduce the number of grey levels. The major issues associated with BTC are unnecessary blocking and false contouring effects. To overcome these issues a complementary Hiding Error Diffused Block Truncation Coding was developed by Jing-Min-Guo and Yun-Fu-Lin. This method overcomes the limitations of traditional BTC, ensure the image quality and highest processing efficiency. The existing system consists of an encoder and decoder and the encoder spreads the watermark into two marked images and the corresponding data security is also improved with the security sharing concepts. However the existing system uses a pseudo random key, which is not synchronized in between the encoder and decoder may leads to wrong extraction. Another problem associated with the existing system is Block size. Various block size can lead different bitmap through existing decoder and the system does not consider the bias limitation, number of water mark as keys and cannot protect the embedded data. The proposed system overcomes the limitations of existing CHEDBTC system without altering its advantages. Our system can yield high image quality and can with stand against various types of security attacks
Authors and Affiliations
Sobimol Mathew
Performance Issues on the Interoperability between IEEE 802.3 & IEEE 802.11 in Heterogeneous Network Environment
Abstract: This paper addresses network computing that seeks to utilize the aggregate resources of many networked computers that can be installed in heterogeneous environment to solve problems of resource allocation, and...
A Quantified Approach for large Dataset Compression in Association Mining
With the rapid development of computer and information technology in the last several decades, an enormous amount of data in science and engineering will continuously be generated in massive scale; data com...
A Study On Diffie Hellman Algorithm And Elliptic Curve Cryptography
Cryptography is the vast discipline to provide security at a greater level for our information. The Diffie Hellman (DH)Algorithm and Elliptic Currve Cryptography(ECC) are two different approaches to provide unique key. U...
Development of a Global Positioning System-Enabled ElectronicVoting System
Abstract: This paper deals with the design and development of an electronic voting (e-voting) system withGlobal Positioning System (GPS) device for client service authentication and poll centre co-ordinatesmonitoring to...
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter Based NEDA Technique
In this paper, we describe an efficient Xilinx Virtix4 discrete wavelet transform (DWT) using 9/7 filter based new efficient distributed arithmetic (NEDA) Technique. We demonstrate that NEDA is a very efficie...