CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topic of concern. Data hiding is a powerful tool that provides mechanism for securing data over insecure channel by concealing information within information. Steganography inherits data hiding concept and passes information through host files in such a way that the existence of the embedded secret is unknown. This paper presents a joint application of compression, encryption and embedding techniques for implementing digital image steganography. Compression technique generates noise in the image. Inorder to retain the noise distortion to a minimum level, LSB insertion method is used for embedding purpose where the bits are inserted at the last 2 LSB’s of the image. In this proposed technique the secret information is initially compressed and then the resultant bits are encrypted. Finally these encrypted bits are embedded into an image. The main objective is to develop an application that increases the steganographic capacity and enhances the stego image quality while keeping the security intact.
Authors and Affiliations
Palak Mahajan, , Dr. Ajay Koul
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Using Morphological Transform Domain
This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate pre...
Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding
Abstract: A wireless sensor network is usually composed of a large number of spatially distributed autonomous sensor nodes. Advancement in the field of modern communication networks especially in the wireless netwo...
Dynamic Method for Load Balancing in Cloud Computing
Abstract: The state-of-art of the technology focuses on data processing and sharing to deal with huge amount of data and client’s needs. Cloud computing is a promising technology, which enables one to achieve the a...
Big Data Implementation Challenges and Solutions
Abstract: Big Data – Adoption challenges and solutions Enterprises are encumbered by certain challenges in their Big Data adoption journey. Some of these challenges are: Inhibition in making the first move for a particul...
E-Learning Certificate Using Digital Watermarking Technology
Abstract: There has been an increasing demand for e-learning technologies and especially for digital watermarking. Using the digital watermarking technology in e-learning is increasingly becoming an important part...