• Corpus ID: 64303179

Secure Data Hiding in Images within Selected Zones

@article{Manjrekar2014SecureDH,
  title={Secure Data Hiding in Images within Selected Zones},
  author={Neha Manjrekar and Shruti Savant and Deepashri Chavan and Heena Azmi and G. Sharma},
  journal={International journal of innovative research and development},
  year={2014}
}
Security has become one of the most significant problems in distributing new information. It is necessary to protect this information while communication over insecure networks. Cryptography and Steganography[7][8] are two major techniques for secret communication. This paper presents a high security model by combining cryptography and steganography[7][8] techniques which encrypts the text data and then  hides the encrypted data in the robust regions of the image. It will facilitate secret… 

References

SHOWING 1-9 OF 9 REFERENCES
A secured key-based digital text passing system through color image pixels
TLDR
This paper is going to propose a framework for embed text string into digital color images and the text that is embedded is perceptually invisible to Human Visual System (HVS).
High Capacity Image Steganography Based on Curvelet Transform
TLDR
The aim of this paper is to propose a modified high-capacity image steganography technique based on curve let transform with acceptable levels of imperceptibility and distortion in the cover image and high level of overall security.
GA-Based LSB-Matching Steganography to Hold Second-Order Statistics
TLDR
A modified LSB-matching method is proposed to hold second-order statistics described by Markov Chain distance, and the genetic algorithm is used to find the optimum tuning vector to match LSBs of image pixels and message bits.
An Application Based on Steganography
  • H. KaramanŞ. Sağiroğlu
  • Computer Science
    2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
  • 2012
TLDR
A steganography application for the receptions of the Presidency of the Republic of Turkey is developed, and the identity information of the guests are first encrypted, and then embedded in their photos using the LSB technique on BMP images.
Data Hiding in Images by Hybrid LSB Substitution
TLDR
Experimental results show that the proposed methods are superior to previous works and based on the collaboration technologies, better stego-image quality can be achieved.
Merged Computation for Whirlpool Hashing
This paper presents an improved hardware structure for the computation of the Whirlpool hash function. By merging the round key computation with the data compression and by using embedded memories to
When Hashes Collide
TLDR
The authors discuss the issues that have arisen around the recently announced problems with the SHA-1 hash function and its ancestor, MD5.
Implementation of Image Descriptor Based on SURF and DCD
TLDR
An image descriptor is presented and implemented that extracts the feature of image using combination of SURF (Speed Up Robust Feature) and DCD (Dominant Color Descriptor) scheme to achieve results which are applicable to mobile environments.