SEPARABLE REVERSIBLE SCHEME FOR DATA HIDING IN IMAGE-A REVIEW
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
Internet is the popular communication media now a days but message transfer over the internet is facing some problem such as data security, copyright control, data size capacity, authentication etc. Data hiding plays an important role in data security. It is a process in which secret data or information is stored or hidden into cover media. And so many researches are progressing on the field like internet security, steganography, and cryptography. When transfer the secure data over an insecure channel it is needed to encrypt cover or original data and then embed the secure data into that original or cover image. This project introduces the new way of originating the previous concept i.e. separable reversible scheme for data hiding. Actually, the separable reversible data hiding technique is based on steganography and related with internet security. Data hiding process is a combination of set of the embedded secret data and a set of the cover media or original image. The main objectives of this literature is to work on the concept in which we used text as a hidden data, attempt to increase the amount of data which is to be hide in the cover image, evaluating quality of image by different interpretations. The principle of separable reversible data hiding is consisting of three key procedures. First is encrypt the cover image second hide the data in encrypted image and last extract the secret data from the cover image.
Authors and Affiliations
Miss. Pratiksha S. Kale
AN INNOVATIVE APPROACH FOR PLASTIC SURGERY FACE RECOGNITION-A REVIEW
The face recognition has great significance in surveillance system as it doesn’t need the object’s cooperation. The actual advantages of face based identification over other biometrics are uniqueness and acceptanc...
AUTOMATIC ANNOTATION OF QUERY RESULTS FROM DEEP WEB DATABASE
In recent years, web database extraction and annotation has received more attention from the database . When search query is submitted to the interface the search result page is generated. Search Result Records...
Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network
Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmi...
REMOVAL OF MALACHITE GREEN DYE FROM AQUEOUS SOLUTION BY ELECTROCOAGULATION WITH STAINLESS STEEL ELECTRODES
In order to see the influence of different variable parameters (inter electrode distance, initial conductivity, time of electrolysis, pH of the solution and initial concentration of dye) and the efficiency to remove Mal...
Design of Self-tuning PID controller using Fuzzy Logic for Level Process
In this paper a self-tuning PID controller is designed using fuzzy logic for a liquid level process of single tank and two tank systems. Conventional technique like Ziegler’s Nichols method can be enhanced using f...