Secure information hiding using LSB features in an image

Author(s):  
K. Praghash ◽  
Ch. Vidyadhari ◽  
G. NirmalaPriya ◽  
Rajan Cristin
2012 ◽  
Vol 6 (4) ◽  
pp. 71-93
Author(s):  
Ming Yang ◽  
Chih-Cheng Hung ◽  
Edward Jung

Secure communication has traditionally been ensured with data encryption, which has become easier to break than before due to the advancement of computing power. For this reason, information hiding techniques have emerged as an alternative to achieve secure communication. In this research, a novel information hiding methodology is proposed to deliver secure information with the transmission/broadcasting of digital video. Secure data will be embedded within the video frames through vector quantization. At the receiver end, the embedded information can be extracted without the presence of the original video contents. In this system, the major performance goals include visual transparency, high bitrate, and robustness to lossy compression. Based on the proposed methodology, the authors have developed a novel synchronization scheme, which ensures audio/video synchronization through speech-in-video techniques. Compared to existing algorithms, the main contributions of the proposed methodology are: (1) it achieves both high bitrate and robustness against lossy compression; (2) it has investigated impact of embedded information to the performance of video compression, which has not been addressed in previous research. The proposed algorithm is very useful in practical applications such as secure communication, captioning, speech-in-video, video-in-video, etc.


2019 ◽  
Vol 8 (7) ◽  
pp. 226-230
Author(s):  
Zo Nun Khuma ◽  
Dr. Khaing Myat Mon ◽  
Dr. Cho Cho Myint

Author(s):  
S. Armeni ◽  
D. Christodulakis ◽  
I. Kostopoulos ◽  
Y. C. Stamatiou ◽  
M. Xenos

2020 ◽  
Vol 10 (4) ◽  
pp. 568-575
Author(s):  
Abdul Alif Zakaria ◽  
◽  
Norli Anida Abdullah

Information sharing among the associations is a general development in a couple of zones like business headway and exhibiting. As bit of the touchy principles that ought to be kept private may be uncovered and such disclosure of delicate examples may impacts the advantages of the association that have the data. Subsequently the standards which are delicate must be secured before sharing the data. In this paper to give secure information sharing delicate guidelines are bothered first which was found by incessant example tree. Here touchy arrangement of principles are bothered by substitution. This kind of substitution diminishes the hazard and increment the utility of the dataset when contrasted with different techniques. Examination is done on certifiable dataset. Results shows that proposed work is better as appear differently in relation to various past strategies on the introduce of evaluation parameters.


Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


Sign in / Sign up

Export Citation Format

Share Document