A Novel Approach for Hiding Image Using Pixel Intensity
(*) Corresponding author
DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
Abstract
Data communication technologies has leaped into a great level of acceptance globally as it goes hand-in-hand with the other types of data in the carry plane of communication providing every ounce of optimized data. When it has been put in to the public network. Data can be coded as an image or audio or video using a cipher technique named steganography, where image preferred as a cover object. Taking into account of the RGB channel of the given image three kinds of algorithm are utilized in the method that exist earlier whereas with slight alteration were rendered to the proposed system to improve embedding capability .Color channels were used for designing three algorithm with intensity as its cornerstone. Analyzing the accomplishment of three algorithms the most efficient one is considered.
Copyright © 2013 Praise Worthy Prize - All rights reserved.
Keywords
Full Text:
PDFReferences
M.Shobana , R.Manikandan , Efficient Method for Hiding data by pixel intensity , International Journal of Engineering and Ttechnology(IJET), vol .5 n.1, Feb-March 2013, pp. 75-81.
Amirtharajan R, Mahalakshmi, V, Sridharan, N, Chandrasekar. M,Rayappan.J.B,Modulation of hiding intensity by channel intensity - Stego by pixel commando, International Conference on Computing, Electronics and Electrical Technologies (ICCEET) 2012.
R.Amirtharajan,Dr. R. John Bosco Balaguru, Tri-Layer Stego for Enhanced Security – A Keyless Random Approach , Internet Multimedia Services Architecture and Applications(IMSAA),December 2009,pp.1 – 6.
Kang Leng Chiew, Josef Pieprzyk, Blind Steganalysis: A Countermeasure for Binary Image Steganography, conference on Availability, Reliability and Security(ARES),Feb -2010,pp. 653 – 658.
Fabien A. ,P. petitcolas, Ross .J. Anderson, and Markus G. Kuhn, Information Hiding—A Survey, proceeding of the Institute of Electrical and Electronics Engineers (IEEE) ,vol. 87 n. 7, July -1999,pp. 1062 – 1078.
M. Shirali-Shahreza, S. Shirali-Shahreza, Text Steganography Using Ligatures, (2008) International Review on computers and software (IRECOS), 3 (4), pp. 418-423.
M. Shirali-Shahreza, Steganography in Artistic Websites, (2007) International Review on computers and software (IRECOS), 2 (1) pp. 25-29.
Refbacks
- There are currently no refbacks.
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize