Subscribe Now Subscribe Today
Science Alert
Curve Top
Information Technology Journal
  Year: 2012 | Volume: 11 | Issue: 5 | Page No.: 587-595
DOI: 10.3923/itj.2012.587.595
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Inverted Pattern in Inverted Time Domain for Icon Steganography

Rengarajan Amirtharajan and John Bosco Balaguru Rayappan

Information technologies and communications have pervaded our homes and business places. No matter how well-organized and extensive the communication technology is there are always loop holes in the network and people who seek after the clandestine information to extract from these loop holes. The pandemic problem of security is still a raging problem as every solution compromises on one trait to heighten the other(s) according to the necessity of the hour. In this paper we suggest an algorithm where we have tried to retain all the three important banalities of secure communication: robustness, capacity and imperceptibility by using Haar Integer wavelet transform a Discrete Wavelet Transform (DWT) domain method in tandem with a cryptic scheme i.e. the direct binary or inverted binary embedding of data. Experimental results that compute the MSE and PSNR show that this algorithm caters to the need of the hour by delivering the high capacity with good imperceptibility.
PDF Fulltext XML References Citation Report Citation
  •    Galois Field Proficient Product for Secure Image Encryption on FPGA
  •    Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
  •    Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity
  •    PVD Based Steganography on Scrambled RGB Cover Images with Pixel Indicator
  •    Audio Fingerprint Indicator in Embedded Platform: A Way for Hardware Steganography
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    An Overview on Hiding Information Technique in Images
  •    On the Capacity and Security of Steganography Approaches: An Overview
  •    Pixel Forefinger for Gray in Color: A Layer by Layer Stego
How to cite this article:

Rengarajan Amirtharajan and John Bosco Balaguru Rayappan, 2012. Inverted Pattern in Inverted Time Domain for Icon Steganography. Information Technology Journal, 11: 587-595.

DOI: 10.3923/itj.2012.587.595






Curve Bottom