Subscribe Now Subscribe Today
Science Alert Home Journals at Science Alert For Authors For Subscribers Contact Us
   
Information Technology Journal
  Year: 2012 | Volume: 11 | Issue: 5 | Page No.: 587-595
DOI: 10.3923/itj.2012.587.595
Inverted Pattern in Inverted Time Domain for Icon Steganography
Rengarajan Amirtharajan and John Bosco Balaguru Rayappan

Abstract:
Information technologies and communications have pervaded our homes and business places. No matter how well-organized and extensive the communication technology is there are always loop holes in the network and people who seek after the clandestine information to extract from these loop holes. The pandemic problem of security is still a raging problem as every solution compromises on one trait to heighten the other(s) according to the necessity of the hour. In this paper we suggest an algorithm where we have tried to retain all the three important banalities of secure communication: robustness, capacity and imperceptibility by using Haar Integer wavelet transform a Discrete Wavelet Transform (DWT) domain method in tandem with a cryptic scheme i.e. the direct binary or inverted binary embedding of data. Experimental results that compute the MSE and PSNR show that this algorithm caters to the need of the hour by delivering the high capacity with good imperceptibility.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Galois Field Proficient Product for Secure Image Encryption on FPGA
  •    Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
  •    Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity
  •    PVD Based Steganography on Scrambled RGB Cover Images with Pixel Indicator
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    An Overview on Hiding Information Technique in Images
  •    On the Capacity and Security of Steganography Approaches: An Overview
How to cite this article:

Rengarajan Amirtharajan and John Bosco Balaguru Rayappan, 2012. Inverted Pattern in Inverted Time Domain for Icon Steganography. Information Technology Journal, 11: 587-595.

DOI: 10.3923/itj.2012.587.595

URL: http://scialert.net/abstract/?doi=itj.2012.587.595

 
COMMENT ON THIS PAPER
.
 
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 
 
 

                 home       |       journals        |       for authors       |       for subscribers       |       asci
          © Science Alert. All Rights Reserved