Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 209-217
DOI: 10.3923/rjit.2013.209.217
Concealed to Protect and Protect to Conceal: A Conserved Stego Image
Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

Abstract:
In the ubiquitous computing world, data are accessed by everyone at any time anywhere. People want to perform their business and personal tasks on-line. A person always wants to be on communication for banking, shopping and learning. The attractive and faster access on line facilities have to concern the secrecy of the messages exchanged over the communication media. Besides the communicating parties, there is a chance for the intruder to access the secret data. Data should be secured such that no malicious user knows the presence of the secret data. Everybody in this universe needs a secret communication world. To satisfy the need of all the Internet users, information hiding technology has developed. The most powerful weapon to hide a secret message is steganography, which is older than cryptography. This study presents one more algorithm involving three easily implementable but complex procedures to increase the security during transmission of secret data. The routines are key value based k-bit embedding, embedding in line with Fibonacci series and by Shannon-Fano encoding, respectively. Each method follows an ideal procedure to encapsulate more secret information at the same time meeting other requirements for an idyllic transmission. The performance of this study is evaluated by means of MSE and PSNR and the results are tabled.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
How to cite this article:

Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to Protect and Protect to Conceal: A Conserved Stego Image. Research Journal of Information Technology, 5: 209-217.

DOI: 10.3923/rjit.2013.209.217

URL: https://scialert.net/abstract/?doi=rjit.2013.209.217

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 

Curve Bottom