Learn More
There is no exact solution for colorization of grayscale images. In the initial work done [23], color traits transfer techniques to color grayscale images are proposed. The main focus of the techniques [23] is to minimise the human efforts needed in manually coloring the grayscale images. The human interaction is needed only to find a reference color image,(More)
How to search appropriate data from huge image pool has become vital issue. Because of easy availability of imaging devices, millions of images are being added to image pool every day. Image retrieval deals with searching relevant images from large image database. The paper presents novel image retrieval techniques based on discrete cosine transform applied(More)
Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. In this paper a novel method for embedding messages in an image with increased capacity is(More)
This paper describes the methods to increase the capacity of the cover image for information hiding. In this paper we have proposed two novel multiple least significant bit replacement techniques KIMLA and KAMLA to increase the information hiding capacity of the cover image. Comparative results of KIMLA, KAMLA and their previous version KMLA [1] are also(More)
This paper proposes an improved method for attacking the LSB (Least Significant Bit) matching steganography. In LSB matching steganography the least two or more significant bit-planes of the cover image would be changed during the embedding and thus the pairs of values do not exist in stego image. In the proposed method, an image is obtained by combining(More)
In this paper we are introducing the concept of embedding secret message in Transform domain using low energy components using DCT and Walsh Transform. This results in less perceptible error in the stego image. The low energy components are spread over the transform domain that gives high security to the embedded message. The study is carried out for(More)
This paper presents a novel method for isolated English word recognition based on energy and zero crossing features with vector quantization. This isolated word recognition method consists of two phases, feature extraction phase and recognition phase. In feature extraction, end points are detected and noise is removed using end point detection algorithm, a(More)
Steganography is used to hide the occurrence of communication. Discovering and rendering useless such covert message is an art of Steganalysis. A popular Steganalysis technique is Difference Image Histogram (DIH), proposed by Zhang, aimed at LSB steganography. This algorithm can not only detect the existence of hidden messages embedded using sequential or(More)
In this paper a simple approach to text dependent speaker identification using spectrograms and row mean is presented. This, mainly, revolves around trapping the complex patterns of variation in frequency and amplitude with time while an individual utters a given word through equalized spectrogram. These equalized spectrograms are used as a database to(More)
  • 1