Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 317-328
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Random Abrasion on Image for Security Magnification

Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

In this study, projected a model for safe secret-digital file transmission by having Steganography as the ground. Steganography, in prehistoric times, dealt with camouflage of secrets between two parties. A part from text, many images, audio and video in millions are shared between millions. All sorts of the aforesaid face a common and serious challenge. Here proposed three routines, in which clandestine information is embedded based on the key in method 1, i.e., number and position of 1s in the four Least Significant Bits (LSB) of the key decides the pixels for embedding. In method 2, position of 1s in the entire key decides the pixels and the position of 1s in four LSBs only decides the location for embedding. In method 3, secret data is plunged by means of the same process but not directly. Instead, it is encoded by Huffman Coding and then embedded. Justification for this study is given by computing Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) values for all the planes in the images by taking sample key values for all the three methods. Experimental results are demonstrated and the corresponding image outputs are also presented.
PDF Fulltext XML References Citation Report Citation
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
  •    An Overview on Hiding Information Technique in Images
How to cite this article:

Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Random Abrasion on Image for Security Magnification. Research Journal of Information Technology, 5: 317-328.





Curve Bottom