Robust Digital Data Hiding in Low Coefficient Region of Image
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 1
Abstract
Digital images have many uses in the field of health, research, military, art, etc. Digital Images need annotation for retrieval and protection from piracy, attacks, and modification. To perform this retrieval and protection, some of the information was hidden in the image matrix. This paper proposes a data embedding and extraction algorithm. Low-frequency regions of the image are identified to embed secret information in LSV (Least Significant Value) and MSV (Most Significant Value) of a selected coefficient once the data hiding in the embedding section of the proposed model image gets retransformed in the original image structure as per the number of bits used in LSV and MSV for data hiding image gets secured from different spatial attacks. The experiment is performed on real images. A comparison of the proposed model is done on PSNR, MSE, evaluation parameters. It is shown that the proposed model is better as compared to the existing model.
Authors and Affiliations
Nomaan Jaweed Mohammed, Mohamed Manzoor Ul Hassan
Leveraging Artificial Intelligence for Data Networking and Cybersecurity in the United States
The United States has rapidly advanced in data networking infrastructure, driven by the widespread adoption of 5G networks, Internet of Things (IoT) devices, and cloud computing technologies. This rapid technological exp...
Verification of Adaptive Collection for Brain Computer Interface
To provide speech prostheses for individuals with severe communication impairments, brain computer interfaces (BCIs) using silent speech have been studied. I proposed adaptive collection, which divided brainwaves into sm...
Mobile Based Event Driven Management System
With the changing communication services, it’s all on the user to choose what way of communication is suitable to communicate with different set of devices. For this an up-to date user presence is required for an essenti...
A Strong Blind Signature Using Cascade Blind Factors
This paper presents a modified version of blind signature . The proposed method adds more complex blind factors to increase the blindeness property of the message sent . In order to achieve this goal , the proposed syste...
A Review on Time Travel: Fact or Fiction
This article focuses on Einstein's theory of relativity and Minkowski space-time, which combines three dimensions of space and a fourth dimension of time. It contrasts and examines the evolution of time travel in science...