CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topic of concern. Data hiding is a powerful tool that provides mechanism for securing data over insecure channel by concealing information within information. Steganography inherits data hiding concept and passes information through host files in such a way that the existence of the embedded secret is unknown. This paper presents a joint application of compression, encryption and embedding techniques for implementing digital image steganography. Compression technique generates noise in the image. Inorder to retain the noise distortion to a minimum level, LSB insertion method is used for embedding purpose where the bits are inserted at the last 2 LSB’s of the image. In this proposed technique the secret information is initially compressed and then the resultant bits are encrypted. Finally these encrypted bits are embedded into an image. The main objective is to develop an application that increases the steganographic capacity and enhances the stego image quality while keeping the security intact.
Authors and Affiliations
Palak Mahajan, , Dr. Ajay Koul
Influence of Socioeconomic Status and Expectations among Completely Edentulous Patients on Conventional Complete Denture Treatment
Objective: The purpose of this study was to determine the effect of socioeconomic status on patient expectation from the treatment through a Questionnaire based survey. Material and Method: The Present study was conducte...
Segmentation of White Blood Cells Using Fuzzy C Means Segmentation Algorithm
ABSTRACT: The objective of this paper is to develop a tool to identify the white blood cells from blood smear images through segmentation. In our research work, we have identified white blood cells from color image...
Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Islamic University
This paper highlights the role of web mining in building a web retrieval system to extract hidden knowledge for the Semantic Web by using association rule mining techniques to find a frequent itemset for the &nb...
Connected Component Clustering Based Text Detection with Structure Based Partition and Grouping
Abstract: Extraction of text from natural scene images is a challenging problem because of its complex backgrounds and large variations of text patterns. In this paper, we presents an innovative scene text detection algo...
User Profile Completion with Online Social Circles
User profile is a kind of most effective feature and cue of user behavioranalysis. However, most ofusers'profiles are incomplete and untruthful, and users' tag and profile data are rathersparse on social media. It...