Submit Search
Upload
Hybrid Approach for Improving Data Security and Size Reduction in Image Steganography
•
0 likes
•
36 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i6/IRJET-V4I6704.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Editor IJMTER
IRJET- Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
Image Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
Ijetcas14 527
Ijetcas14 527
Iasir Journals
Av4102350358
Av4102350358
IJERA Editor
Ijritcc 1378
Ijritcc 1378
Rahul Sharma
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
Recommended
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Editor IJMTER
IRJET- Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
Image Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
Ijetcas14 527
Ijetcas14 527
Iasir Journals
Av4102350358
Av4102350358
IJERA Editor
Ijritcc 1378
Ijritcc 1378
Rahul Sharma
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
Ijariie1132
Ijariie1132
IJARIIE JOURNAL
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET Journal
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
IJERA Editor
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
G017444651
G017444651
IOSR Journals
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET Journal
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
csandit
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
A Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
ijsc
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AES
IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
IJNSA Journal
More Related Content
What's hot
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
Ijariie1132
Ijariie1132
IJARIIE JOURNAL
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET Journal
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
IJERA Editor
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
G017444651
G017444651
IOSR Journals
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET Journal
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
csandit
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
A Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
ijsc
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
What's hot
(19)
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
Ijariie1132
Ijariie1132
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
G017444651
G017444651
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Similar to Hybrid Approach for Improving Data Security and Size Reduction in Image Steganography
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AES
IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
IJNSA Journal
A new image steganography algorithm based
A new image steganography algorithm based
IJNSA Journal
IJSRED-V2I2P12
IJSRED-V2I2P12
IJSRED
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
P017329498
P017329498
IOSR Journals
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
ijseajournal
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
IRJET Journal
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
L045056469
L045056469
IJERA Editor
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
IOSR Journals
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
O017429398
O017429398
IOSR Journals
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
IRJET Journal
Similar to Hybrid Approach for Improving Data Security and Size Reduction in Image Steganography
(20)
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AES
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A new image steganography algorithm based
A new image steganography algorithm based
IJSRED-V2I2P12
IJSRED-V2I2P12
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
P017329498
P017329498
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
L045056469
L045056469
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
O017429398
O017429398
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Hybrid Approach for Improving Data Security and Size Reduction in Image Steganography
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2845 HYBRID APPROACH FOR IMPROVING DATA SECURITY AND SIZE REDUCTION IN IMAGE STEGANOGRAPHY Mandeep Kaur1, Asst.Prof. Rupinder Kaur Randhawa2 1Mandeep Kaur, Dept.of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Punjab, India 2Asst. Prof. Rupinder kaur Randhawa, Dept.of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Punjab, India ------------------------------------------------------------------***------------------------------------------------------------------ Abstract – Image steganography is used to hide the secret message under a cover image in order to enhance the security. There are several proposed techniques which are focused on the security issue in their work. In this paper, a new technique is presented, implemented and analyzed. The proposedmethod uses three different techniques such as Huffman encoding, Deoxyribonucleic acid and State Transition. Initially, Huffman is applied over the text for the compression, and then Deoxyribonucleic acid is applied over the compressed data for the encryption and lastly State Transition algorithm has used for updating the location in the image. Theapplicationofthese algorithms provides high security in comparison with the traditional algorithms. The implementation of these algorithms is done with respect to message bits. Total three images are used for the evaluation of traditionalandproposed techniques in which the message bit varies from fifty to hundred. The simulation analysis concludes that the proposed method is efficient, more secure and proficient in comparison with other techniques such as LSBs, LF-DCT and MF-DCT. The parameters PSNR and MSE are used for the evaluation of their performance. Keywords: Steganography, Cryptography, Huffman Encoding, Deoxyribonucleic acid, State Transition. 1. INTRODUCTION Steganography isthewordtakenfromthetwoGreek words as “steganos” and “graphic” which mean “concealed” and “writing” respectively. Jointly it referred as concealed (hidden or covered) the message. Accordingly, steganography is the process of hiding the message before transmitting it to the receiver. Data can be hidden within another digital medium such as text, image, audio or video. With the application of this technique intruder will not be able to suspect the existence of the message. Basic idea or motivation behind implementation of image steganography is to communicate between the members without having fear of being attacked of messages. Due to its advantages, it has been used in several areas including military, intelligence operatives or bureaus. These fields of espionage required a method which can hide their critical data and no intermediate person can evaluate the meaning of the data. The main goal of using steganography istoavoidthe attention of the attacker from the hidden information in the transmitted as if attacker would come to know that there isa hidden data into the sent messagethenobserverwill tryeach possible idea so that he can read the hidden message. Fig-1: Process of steganography Steganography can be applied with cryptography. Fig-1 shows the model of steganography process with cryptography. 1.1 Techniques for Steganography Steganography provides variousmethods whichcan be used to embed the data with the cover object. Techniques for the steganography are classified such as: Spatial Domain Methods: In this type of Steganography method, data that needs to be hidden is directly embed with the current intensity of the pixels. Which resultant into the change of pixel values of the image directly at the time of hiding data. Some of the spatial domain techniques are: (1) Least Significant Bit (LSB) (2) Pixel value Differencing (PVD) (3) Edges based Data Embedding Method (EBE) (4) Random pixel embedding method (RPE) (5) Mapping pixel to hidden data method (6) Labeling or connectivity method Select image to hide data Algorithm for encrypting data Image after steganography Secret message
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2846 (7) Pixel intensity based (8) Texture based method Transform Domain Technique: In this type of technique message is embedded in the frequency domain of the cover object.Several algorithms and transformations can be used to conceal the message into image. Classifications on the transfer domain are mentioned below: (1) Discrete Fourier transformation technique (DFT) (2) Discrete cosine transformation technique (DCT) (3) Discrete Wavelet transformation technique (DWT) (4) Lossless or reversible method (DCT) (5) Embedding in coefficient bits 1.2 Data Compression There are number of techniques available used for data compression such as “Lossy” compression.Insuchtechnique it provides help in reducing the actual amount of the data. Basically, it reduces the size of the information by losing redundant part of it. Image format JPEG uses Lossy compression technique. Lost information can be restored after performing decompression on the targeted image. Alternatively, “Lossless” compression techniquedoesnot discard any of the information fromtheoriginal image.There are different techniques available for lossy and lossless compression which can be chosen according to the requirements. Compression means reduction of redundant data but retains the quality of the image. There are two types of techniques that are used to compress the image. A. Lossless compression technique B. Lossy compression technique 2. LITERATURE SURVEY R.S.A-EI et.al [13] describes discrete Cosine Transform based steganography uses DC parts to hidesecret bits in a sequence manner in Least significant Bits. Their values indicate that the proposed tool provides a relatively a high embedding storage with no visual damage in the resulting image, whereas it enhances the security level and manages the correctness of the hidden data. S. Esra et.al [14] discussed about the storage and security problems of text steganography that have been considered to do better by propose scheme of a novel approach. The proposed scheme has been reached to 7.042% for hidden messages that contains 300 characters. Experimental results obtains that the proposed scheme provides a significantaddition interms of capacity. Q.T.Thach et.al [12] describesthework inneedto find the modified pixels, or residuals, as an artifact of the embedding process. This paper establishes an excellence result that addresses shortcoming: shows that the expected mean residuals contain enough data to order logically the located payload provided that the size of the payload in each stego image varies. S.H.J et.al [15] discussed aboutthreedata hiding methods that are proposed, that are based upon the features of DNA sequences. For each method, a corresponding DNA sequence S is selected and the hidden message M is incorporated into it so that S’ is produced. S’ is then transfer to the receiver and the receiver is able to recognize and extract the message M hidden in S’. Finally, experimental results indicate a better performance of the proposed methods in comparison to the performance of the traditional methods.W.Kan et.al [19] describes technique is based on manipulating the quantization table and quantized discrete cosine transformation coefficients. Experimental reports show that the proposed method attains both high storage and high image quality without any damage. G.X.Z.D.Yang et.al [4] discussed about discrete STA, there are four basic operators like swap, shift, symmetry and substitute as well as the “risk and restore in probability” strategy. Firstly, main concern is on a parametricstudyof the restore probability p1 and risk probability p2. To effectively deal with the head pressure constraints, it investigates the effect of penalty coefficient and finds enforcement on the performance of the algorithm. Based on the experience gained from the training of the Two-Loop network problem, the discrete STA has successfully achieved the best known results for the Hanoi and New York problems. S.K.Ket.al[16] describes paper proposes a scheme by compressingencoded data with the help of a subservient data and Huffman coding. The encoded data is then compressed using a quantization mechanism and Huffman coding. To quantize the image subservient data obtained by the data owner is used. The quantized values are then coded by the use of Huffman coding. Experimental resultsshowthatthecompressionratio distortion performance of this method is superior to the traditional Techniques. T. Turkeret.al[18]discussedabout a new data hiding technique is proposed based on hidden sharing scheme with the DNA exclusive operator for color images. Each input value of truth table is analyzed and according to that analysis, highest PSNR value is selected for secret sharing. The comparison of these techniquesindicates that proposed techniques give the most successful result. M.Samiha et.al [11] describes paper presents a comprehensive analysis between the DNA-based play RSA, AES ciphers, fair, and vigenere each combined with a DNA hiding method. The conducted analysis results the performance diversity of each combined method in terms of security, speed, hidden storage in addition to both key size and data size. J.Reza et.al [6] discussed about, improvement of image compression through steganography. The first scheme in addition to a steganographic algorithm with the baseline DCT-based JPEG, while the next one uses this steganographic algorithm with the DWT-based JPEG. In this paper data compression is performed two times. Experimental results shows for this promising method to have wide potential /in image code. 3. PROBLEM FORMULATION On the basis of literature survey it is found that the technique that was widely used for the purpose of image steganography was LSB (Least Significant Bit). The main unsolved issue is pixel variation in the imagewhileusing LSB
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2847 (Least Significant Bit) technique. Many techniqueshavebeen combined with LSB such as Laplacian Pyramid, Chaos, genetic algorithm etc to provide a solution of variation of pixel but have no positive impact on the issue. Another problem is regarding the security of the data that is hidden behind the image. Hence there is a requirement to develop such a technique that can be able to secure thedata aswell as maintain the effects of pixel variation in the image that occur after hiding the data. 4. PROPOSED WORK As steganography is the process of hidingthedata in the image. Various techniques have been proposed but still the security of the data that is one of the major concerns while the data transferred is not achieved. So by studying various techniques a new method is to be proposed in which the security of the data is increased. Before hiding the data first of all compression by Huffman Encoding technique will be applied to the data and then DNA is applied forencrypting the data. State Transition optimization is used for hiding the data behind the image. By compressionandencryptionof the data its security level is increased and is not easily detectable. The proposed work aims to increase the security of the hidden data by applying the HE, DNA and ST. 5. METHODOLOGY The proposed work is divided into two parts first one is to hide the data and second is to extract the hidden data from stego image. The methodology for the proposed work is given as: Data Embedding 1. Initially, select the cover image under whichdata will be hidden. Correspondingly, enter the text which is required to be hidden under the selected cover image. 2. Apply State Transition technique over the entered text for the hiding process. On the other side, Huffman encoding has applied over the entered text. 3. Then Encryption has applied over the compressed data and sends it forward for the hiding of data. 4. Once the compression, Encryption and hiding processes are done, final stego image has acquired in this stage. Fig- 2: Block Diagram for data embedding Data Extraction At sender’s side, text is hidden under cover image and at receiver’s side it is uncover. The steps which are followed by the process are given as: 1. In the beginning selects a stego image on which operation has been performed. 2. Perform data extraction operation over the stego image. 3. Then perform decryption of data or text using DNA approach. 4. After decrypting the text, perform decompression over the text using Huffman algorithm. 5. Obtain extracted text from the stego image. Fig-3: Bock Diagram for data extraction 6. RESULTS AND DISCUSSIONS This section of the paper concludes the objectivesof the study in terms of results. Experiments have performed using several techniques and their performances are measured in terms of two parameters such as Peak Signal to Noise Ratio and Mean Square Error. For the simulation, three different images such as Mandrill image, Lena image and Flower image has been taken. Each image has measured over performance parameters and different techniques i.e. 1-LSB, 2-LSB, LF- DCT, MF-DCT and proposed are applied. The performance of each technique with different images has shown below. The comparison between different technique using different images concludes the proficiency of the proposed technique in terms of different existing techniques. The graph below shows the PSNR of the Mandrill image, where five different techniques are applied over a single image. Among these techniques, MF-DCT produces least PSNR value which shows the high amount of noise in the image. Alternatively,proposedtechniqueoutperformsall in terms of PSNR value as in this technique high amount of data lays with respect to noise. Select Cover Image Apply data hiding by using ST Final Stego Image Enter Text Apply DNA to encrypt the data Apply Huffman to compress the data Select Stego Image Extracted text Perform decryption by applying DNA Perform Data Extraction Perform decompression by Huffman algorithm
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2848 0 100 200 300 400 500 600 700 800 900 1000 35 40 45 50 55 60 65 70 Message Size PSNR(dB) Peak Signal to Noise Ratio(Mandrill Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-1: Comparison of different techniques in terms of PSNR(MandrilImage) 0 100 200 300 400 500 600 700 800 900 1000 0 2 4 6 8 10 12 14 16 18 Message Size Mean Square Error (Mandrill Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-2: Comparison of different techniques in terms of MSE (Mandrill Image) The chart 3 and 4 showstheperformanceparameter PSNR and MSE applied on the Lena image. The techniques are measured on the size of the message. In chart 3 , with variations in the message size, each technique’s efficiency is also varies. The proposed technique is superior to other techniques as the PSNR of the proposed technique is quite high. 0 100 200 300 400 500 600 700 800 900 1000 30 35 40 45 50 55 60 65 70 Message Size PSNR(dB) Peak Signal to Noise Ratio(Lena Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-3: Comparison of different techniques in terms of PSNR (Lena Image) The chart 4 reveals the MSE of each technique with respect to message size. The LF-DCT exposes the high MSE that means its efficiency is lower in comparison with other techniques. The least MSE value is of proposed technique which ensures that the proposed technique is better. 0 100 200 300 400 500 600 700 800 900 1000 0 5 10 15 20 25 30 Message Size Mean Square Error (Lena Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-4: Comparison of different techniques in terms of MSE (Lena Image) 0 100 200 300 400 500 600 700 800 900 1000 40 45 50 55 60 65 70 75 Message Size PSNR(dB) Peak Signal to Noise Ratio(Flower Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-5: Comparison of different techniques in terms of PSNR (Flower Image) The chart 5 and 6 depicts the PSNR and MSE parameter in Flower image. And in both the parameters, the result of the proposed technique is enhanced in comparison with other techniques. In both charts, PSNR is higher and MSE is low that confirms its stability,accuracy and proficiency. 0 100 200 300 400 500 600 700 800 900 1000 0 1 2 3 4 5 6 7 Message Size Mean Square Error (Flower Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart- 6: Comparison of different techniques in terms of MSE (Flower Image)
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2849 Table-1: Testing measurements of the proposed technique The performance of the proposed technique and existing techniques has measured which are indicatedinthe above table. The acquired values from the results identified the performance of individual technique and conclude that proposed technique is more efficient in comparison with other traditional techniques. The PSNR parameter of each image is high in the proposed technique with respect to traditional technique’s PSNR. Correspondingly, MSE is low Image Used Message Size (Characters) 1-LSB MSE 1-LSB PSNR 2-LSB MSE 2-LSB PSNR Proposed MSE Proposed PSNR Mandrill 50 9 .7654 38 .234 9 .7804 38 .227 0.0089 68.6327 100 9 .7766 38 .229 9 .8017 38 .218 0.0204 65.0332 500 9 .8519 38 .196 9 .9584 38 .149 0.1106 57.6927 1000 9 .8543 38 .195 10 .158 38 .063 0.2193 54.7204 Lena 50 13 .227 36 .916 13 .237 36 .913 0.0097 68.2650 100 13 .234 36 .914 13 .258 36 .906 0.0241 64.3116 500 13 .33 36 .882 13 .422 36 .852 0.1179 57.4148 1000 13 .333 36 .882 13 .63 36 .786 0.2468 54.2071 Flower 50 3 .0462 43 .293 3 .0468 43 .292 0.0062 70.1890 100 3 .0468 43 .292 3 .0482 43 .29 0.0136 66.7940 500 3 .0525 43 .284 3 .0589 43 .275 0.0744 59.4153 1000 3 .0594 43 .274 3 .0732 43 .255 0.1499 56.3714
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2850 in the proposed technique for eachimageascomparedto the existing techniques. Consequently, the proposed technique surpasses the each existing technique. 7. CONCLUSION AND FUTURE SCOPE The image steganography techniques have been used to embed the secret message under the cover image. The proposed technique has also performedthesimilartask of stegangraphy with two different algorithms such as DNA and Huffman. Whereas DNA algorithmisusedforhidingand decryption of the text and Huffman is used for compression and decompression of the entered data. The experimental analysis concludes that the proposed technique surpasses the other techniques and extracts the message accurately. The comparison of the proposed technique with other techniques has been performed which confirms that the DNA based encryption technique provides high reliability and security. DCT based steganography provides neutral results and has distortion, 1-LSB and 2-LSB based algorithms have least PSNR andhighMSEandhavemaximal distortion. Consequently, proposedtechniqueresultantinto low MSE and High PSNR whichconcludeslessdistortionand high security. For the future research, the present work can be applied over the different media such as video. Moreover, the State transition algorithm which is used for the optimization in the proposed work can also be replaced with the more superior optimization algorithm. REFERENCES [1] B.M.Baritha,V.Y,” LSB Based Audio Steganography Based On Text Compression”, in International Conference on Communication Technology and System Design, vol 30,Pp 703-710,2012. [2] D.Prasenjit,D.Subhrajyoti,K.Nirmalaya,B.Baby,” An Improved DNA based Dual Cover Steganography”, in ICICT,vol 46,Pp 604-611,2016. [3] E.N.N.EI, Z.R.A.S.AL,”New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm”, in the Journal of systems and softwares, vol 86,Pp 1465-1481,2013. [4] G.X.Z.D.Yang,S.A.R,“Optimal Designof WaterDistribution Networks by Discrete State Transition Algorithm” Pp 1-14, 2013. [5] J.I.F,D.K.A,Z.R.T.AI,S.R.R,”An efficient reversible data hiding algorithm usingtwosteganographic images”,in Signal Processing, vol 128,Pp 98-109,2016. [6] J.Reza, Z.Djemel, R.M.Mehdi,” Increasing image compression rate using steganography”, in Experts Systems with Applications, vol 40, Pp 6918-6927, 2013. [7] L.Hongjun, L.Da, K.Abdurahman,”A novel data hiding method based on deoxyribonucleic acid coding”, in Computers and Electrical Engineering,,vol 39,Pp 1164- 1173,2013. [8] ] L.J.Fen,T.Y-Guo,H.Tao.Y.C-Fang,L.W-Bin,” LSB steganographic payload location for JPEG-decompressed images”, in Digital Signal Processing,Pp 1-11,2014. [9] L.Y-Kai,”A data hidingschemebaseduponDCTcoefficient modification”, in Computer Standards&Interfaces,vol 36,Pp 855-862,2014. [10] M.P, K.T.Gireesh,” Relating the embedding efficiency of LSB Steganography techniques in Spatial and Transform domains”,in ICACC,vol 93,Pp 878-885,2016. [11] M.Samiha,S. Ahmed, N. Khaled,”DNA-based cryptographic methods for data hiding in DNA media”, in Biosystems, vol 150, Pp 110-118, 2016. [12] Q.T.Thach,“Extracting hidden messages in steganographic images” in Digital Investigation,vol 11,Pp S40-S45, 2014. [13] R.S.A-EI, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information” in Computers and Electrical Engineering, Pp 1-20, 2016. [14]S.Esra,I. Hakan, “A compression-based text steganography method” in The Journal of Systems and Softwares, vol 85,Pp 2385-2394, 2012. [15] S.H.J, Ng.K.L, F.J.F, L.R.C.T, H.C.H, “Data hiding methods based upon DNA sequences” in Information Sciences, vol 180,Pp 2196-2208, 2010. [16]S.K.K,J.S.P,K.S.Kumar,” Efficient CompressionofSecured Images using Subservient Data and Huffman Coding” in RAEREST, vol 25,Pp 60-67,2016. [17] S.K,P.P,T.Dr.P,M.Dr.C.M,”Dual Steganography approach for secure data communication”,in International Conferencing on Modelling,Optimisation andComputing,vol 38,Pp 412-417,2012. [18] T.Turker, A.Engin,” A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images” in Displays, vol 41, Pp 1-8, 2016. [19] W.Kan, L.Z-Ming, Hu.Y- Jian, “A high capacity lossless data hiding scheme for JPEG images” in the Journal of Systems and Software , Pp 1-11,2013. [20] Z.Xiaojun, G.D.Yang, Y.Chunhua, G.Weihua,” Discrete state transition algorithm for unconstrained integer optimization problems”, in Neurocomputing, vol 173, Pp 864-874, 2016.
Download now