Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 317-328
DOI: 10.3923/rjit.2013.317.328
Random Abrasion on Image for Security Magnification
Amirtharajan , R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

Abstract:
In this study, projected a model for safe secret-digital file transmission by having Steganography as the ground. Steganography, in prehistoric times, dealt with camouflage of secrets between two parties. A part from text, many images, audio and video in millions are shared between millions. All sorts of the aforesaid face a common and serious challenge. Here proposed three routines, in which clandestine information is embedded based on the key in method 1, i.e., number and position of 1s in the four Least Significant Bits (LSB) of the key decides the pixels for embedding. In method 2, position of 1s in the entire key decides the pixels and the position of 1s in four LSBs only decides the location for embedding. In method 3, secret data is plunged by means of the same process but not directly. Instead, it is encoded by Huffman Coding and then embedded. Justification for this study is given by computing Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) values for all the planes in the images by taking sample key values for all the three methods. Experimental results are demonstrated and the corresponding image outputs are also presented.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
How to cite this article:

Amirtharajan , R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Random Abrasion on Image for Security Magnification. Research Journal of Information Technology, 5: 317-328.

DOI: 10.3923/rjit.2013.317.328

URL: https://scialert.net/abstract/?doi=rjit.2013.317.328

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

       

       

Curve Bottom