Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2012 | Volume: 4 | Issue: 4 | Page No.: 220-227
DOI: 10.3923/rjit.2012.220.227
Graceful Graph For Graceful Security-Towards A Ste (G) Raph
V. Thanikaiselvan, P. Arulmozhivarman, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan

Abstract:
The ubiquitous nature of computers with the rapid advent of technology has exponentially increased the need to secure the confidential information from misuse. Digital communications has led to the combination of both cryptography and steganography which were earlier used separately, to provide the optimum security. Steganography has the advantage of hiding the information in the cover in an invisible way such that the secret isn’t visible to the naked eye. The proposed methodology implements image steganography using three keys for selecting the sub-band for embedding, selecting the order of the coefficients and deciding the number of bits to be embedded, respectively. Graph theory is made use of to select the order of the coefficients of the Integer Wavelet Transform. This present method offers good imperceptibility along with immaculate triple security with K1, K2 and K3.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Why Information Security Demands Transform Domain, Compression and Encryption?
  •    Image Encryption: An Information Security Perceptive
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
How to cite this article:

V. Thanikaiselvan, P. Arulmozhivarman, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2012. Graceful Graph For Graceful Security-Towards A Ste (G) Raph. Research Journal of Information Technology, 4: 220-227.

DOI: 10.3923/rjit.2012.220.227

URL: https://scialert.net/abstract/?doi=rjit.2012.220.227

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

       

       

Curve Bottom