Learn More
This paper presents a new approach of steganography. The secret image is firstly perturbed by Stego-Key (SK) and again perturbed by a genetically generated, good, session based transposition operator (TO). In the next step this perturbed secret image is embedded within the host image by variable bit replacement using a hash function. At the time of(More)
The objective is to investigate the relative advantages and performance of grid based method. To achieve this, the grid-based method was compared with one of the known optimal filter i.e. Kalman filter. First two linear system models were tested by using these two methods. One was 1st order system and another was 2nd order system. The results obtained by(More)
  • 1