• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 10 (10), 2011
  3. 1896-1907
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2011 | Volume: 10 | Issue: 10 | Page No.: 1896-1907
DOI: 10.3923/itj.2011.1896.1907

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 385

Search


Authors


M. Padmaa

Country: India

Y. Venkataramani

Country: India

Rengarajan Amirtharajan

Country: India

Keywords


  • Pixel Value Differencing (PVD)
  • Information hiding
  • Pixel Indicator (PI)
  • steganography
Research Article

Stego on 2n:1 Platform for Users and Embedding

M. Padmaa, Y. Venkataramani and Rengarajan Amirtharajan
The study of communication security includes not just encryption but also traffic security, whose essence lies in "Information Hiding". The security of an image can be enhanced by cleverly embedding data without affecting its quality. This can be done by using information hiding techniques like steganography and cryptography. Combining steganography with cryptography becomes an essential facet for secure communication. In present study, enhanced image quality and security is obtained by consorting pixel indicator technique with PVD technique. Here, the raw data is first encrypted to get two different forms of message T1 and T2 using two distinct keys K1, K2 which is done by using encryption algorithms. As two encrypted messages can be embedded in this process, we have to first extract and then decrypt the message to retrieve the original data. The enhanced level of security is defined by the fact that even if one retrieves the message from the image it’s still incomprehensible to get the original message without the two keys K1 and K2.
PDF Fulltext XML References Citation

How to cite this article

M. Padmaa, Y. Venkataramani and Rengarajan Amirtharajan, 2011. Stego on 2n:1 Platform for Users and Embedding. Information Technology Journal, 10: 1896-1907.

DOI: 10.3923/itj.2011.1896.1907

URL: https://scialert.net/abstract/?doi=itj.2011.1896.1907

Related Articles

Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity
High Capacity Triple Plane Embedding: A Colour Stego
A New Steganography Algorithm against Chi Square Attack
Rubik’s Cube: A Way for Random Image Steganography
Kubera Kolam: A Way for Random Image Steganography
Arabic Text Steganography using Kashida Extensions with Huffman Code
Hiding Data in Video File: An Overview
An Overview on Hiding Information Technique in Images
On the Capacity and Security of Steganography Approaches: An Overview
Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved