• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 4 (4), 2012
  3. 220-227
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2012 | Volume: 4 | Issue: 4 | Page No.: 220-227

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 121

Authors


V. Thanikaiselvan

Country: India

P. Arulmozhivarman

Country: India

John Bosco Balaguru Rayappan

Country: India

Rengarajan Amirtharajan

Country: India

Keywords


  • information hiding
  • integer wavelet transform
  • Random image steganography
  • graph theory
Research Article

Graceful Graph For Graceful Security-Towards A Ste (G) Raph

V. Thanikaiselvan, P. Arulmozhivarman, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan
The ubiquitous nature of computers with the rapid advent of technology has exponentially increased the need to secure the confidential information from misuse. Digital communications has led to the combination of both cryptography and steganography which were earlier used separately, to provide the optimum security. Steganography has the advantage of hiding the information in the cover in an invisible way such that the secret isn’t visible to the naked eye. The proposed methodology implements image steganography using three keys for selecting the sub-band for embedding, selecting the order of the coefficients and deciding the number of bits to be embedded, respectively. Graph theory is made use of to select the order of the coefficients of the Integer Wavelet Transform. This present method offers good imperceptibility along with immaculate triple security with K1, K2 and K3.
PDF Fulltext XML References Citation

How to cite this article

V. Thanikaiselvan, P. Arulmozhivarman, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2012. Graceful Graph For Graceful Security-Towards A Ste (G) Raph. Research Journal of Information Technology, 4: 220-227.

URL: https://scialert.net/abstract/?doi=rjit.2012.220.227

Related Articles

Graphical Password Authentication Scheme for Embedded Platform
Comparative Analysis of (5/3) and Haar IWT Based Steganography
Why Information Security Demands Transform Domain, Compression and Encryption?
Image Encryption: An Information Security Perceptive
Galois Field Proficient Product for Secure Image Encryption on FPGA
Arabic Text Steganography using Kashida Extensions with Huffman Code
Hiding Data in Video File: An Overview
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography
Random Image Steganography and Steganalysis: Present Status and Future Directions

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved