this research elucidate a method of enhancing peak signal to noise ratio and minimizing mean square error through spread spectrum image steganography. the center of focus is more onto security, for that three levels o...
详细信息
ISBN:
(纸本)9781509067343
this research elucidate a method of enhancing peak signal to noise ratio and minimizing mean square error through spread spectrum image steganography. the center of focus is more onto security, for that three levels of security have been designed which are as follows: First level indicates security of hidden text inside cover media by RSA encryption with Diffie-Hellman Key exchange algorithm, Second level of security is maintained by compressing the data to be hidden using Run length Encoding (a lossless compression). Further the communication is kept more secured by spreading the message all over the pixels of cover media using pseudo random generator that generates random locations of pixels in an image and embedding message with Least Significant Bit algorithm to make it highly indiscernible. Withthis technique PSNR of 71.347 dB and MSE of 0.0048 achieved with compression ratio 0.5 and BER of 0.0171.
Withthe development of networks, many fields now demand higher quality in specific image areas, such as main characters in photos, lesion areas in medical images, and features in remote sensing. At the same time, the...
详细信息
In the daily life, secret data delivery is an important application for private communication among parties over computer networks. data embedding technique is a good way to achieve the secret data delivery. A color i...
详细信息
the proceedings contain 110 papers. the topics discussed include: an end to end correctness verification approach for application specific usage control;a novel and efficient cryptosystem for long message encryption;h...
ISBN:
(纸本)9781424448371
the proceedings contain 110 papers. the topics discussed include: an end to end correctness verification approach for application specific usage control;a novel and efficient cryptosystem for long message encryption;human iris pattern recognition using phase components of image;secured communication using steganography framework with sample RTF implementation;a modified remote user authentication scheme using smart card based on ECDLP;a random block length based cryptosystem through multiple cascaded permutation - combinations and chaining of blocks;network coding-aware data aggregation for a distributed wireless sensor network;power line intercom - narrowband voice communication over power line;Ethernet frame tunneling over GPRS/EDGE for universal network monitoring;transcoding based optimum quality video streaming under limited bandwidth;and total traceability system: a sustainable approach for food traceability in SMEs.
the objective of this paper is to implement SPIHT and WDR image coder. We have used here two different images Natural and Artificial. Artificial image stand for image on which enhancement techniques have been applied ...
详细信息
Reversible data hiding technology is an important branch of information hiding technology, and has become an important means to solve problems in information security and privacy protection. Withthe increasing demand...
详细信息
In this paper, we propose a simple reversible data hiding method in the spatial domain for block truncation coding (BTC) compressed grayscale images. the BTC method compresses a block of a grayscale image to a bitmap ...
详细信息
In order to provide secure retrieval for encrypted digital images in cloud-based system, a secure searchable imageencryption algorithm based on Block Truncation coding (BTC) and Henon chaotic map is presented. Henon ...
详细信息
ISBN:
(纸本)9783030000127;9783030000110
In order to provide secure retrieval for encrypted digital images in cloud-based system, a secure searchable imageencryption algorithm based on Block Truncation coding (BTC) and Henon chaotic map is presented. Henon Chaotic map is used to encrypt two quantization levels of BTC compressed images, and a pseudo random sequence is created by chaotic map to scramble the bit plane of each sub-block. the feature value of each sub-block is computed according to the relationship between the number of 1s and 0s in the corresponding bit plane. the encrypted image retrieval can be achieved by comparing the normalized correlation coefficients between the feature vectors. Experimental results show that the proposed scheme has satisfactory retrieval accuracy and security. Meanwhile, it has low computational cost and can be used for encrypted images retrieval in the cloud.
this paper provides a way for secure transmission of data over networks. the security is initialized by means of using biometric data as private key, imposing the biometric data compression using 5- level Discrete wav...
详细信息
For letting graphic lattices approaching lattices, we define imaginary graphs and the leaf-splitting operation and the leaf-coinciding operation, and show an equivalent property: the leaf-splitting connectivity of a c...
详细信息
暂无评论