HOME JOURNALS CONTACT

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 209-217
DOI: 10.17311/rjit.2013.209.217
Concealed to Protect and Protect to Conceal: A Conserved Stego Image
Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

Abstract: In the ubiquitous computing world, data are accessed by everyone at any time anywhere. People want to perform their business and personal tasks on-line. A person always wants to be on communication for banking, shopping and learning. The attractive and faster access on line facilities have to concern the secrecy of the messages exchanged over the communication media. Besides the communicating parties, there is a chance for the intruder to access the secret data. Data should be secured such that no malicious user knows the presence of the secret data. Everybody in this universe needs a secret communication world. To satisfy the need of all the Internet users, information hiding technology has developed. The most powerful weapon to hide a secret message is steganography, which is older than cryptography. This study presents one more algorithm involving three easily implementable but complex procedures to increase the security during transmission of secret data. The routines are key value based k-bit embedding, embedding in line with Fibonacci series and by Shannon-Fano encoding, respectively. Each method follows an ideal procedure to encapsulate more secret information at the same time meeting other requirements for an idyllic transmission. The performance of this study is evaluated by means of MSE and PSNR and the results are tabled.

Fulltext PDF Fulltext HTML

How to cite this article
Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to Protect and Protect to Conceal: A Conserved Stego Image. Research Journal of Information Technology, 5: 209-217.

Related Articles:
© Science Alert. All Rights Reserved