• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (3), 2013
  3. 317-328
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 317-328

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 72

Authors


Amirtharajan

Country: India

R. Anushiadevi

Country: India

V. Meena

Country: India

V. Kalpana

Country: India

J.B.B. Rayappan

Country: India

Keywords


  • huffman coding
  • Information hiding
  • key generation
  • symmetric key steganography
Research Article

Random Abrasion on Image for Security Magnification

Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan
In this study, projected a model for safe secret-digital file transmission by having Steganography as the ground. Steganography, in prehistoric times, dealt with camouflage of secrets between two parties. A part from text, many images, audio and video in millions are shared between millions. All sorts of the aforesaid face a common and serious challenge. Here proposed three routines, in which clandestine information is embedded based on the key in method 1, i.e., number and position of 1s in the four Least Significant Bits (LSB) of the key decides the pixels for embedding. In method 2, position of 1s in the entire key decides the pixels and the position of 1s in four LSBs only decides the location for embedding. In method 3, secret data is plunged by means of the same process but not directly. Instead, it is encoded by Huffman Coding and then embedded. Justification for this study is given by computing Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) values for all the planes in the images by taking sample key values for all the three methods. Experimental results are demonstrated and the corresponding image outputs are also presented.
PDF Fulltext XML References Citation

How to cite this article

Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Random Abrasion on Image for Security Magnification. Research Journal of Information Technology, 5: 317-328.

URL: https://scialert.net/abstract/?doi=rjit.2013.317.328

Related Articles

Hiding Data in Video File: An Overview
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Random Image Steganography and Steganalysis: Present Status and Future Directions
An Overview on Hiding Information Technique in Images

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved