A METHODOLOGY FOR DATA HIDING USING IMAGES
#1

ABSTRACT
In this paper we present a method of embedding information
within digital imagesj called Spread Spectrum
Image Steganography (SS1S) along with its payload capacity.
Steganography is the science of communicating
in a hidden manner. SS1S conceals a message of substantial
length within digital imagery while maintaining
the original image size and dynamic range. The
hidden message can be recovered using the appropriate
keys without any knowledge of the original image. The
capacity of the steganographic channel is described and
the performance of the technique is illustrated. Applications
for such a data-hiding scheme include in-band
captioning, hidden communication, image tamperproofing,
authentication ~ invisible map overlays, embedded
control, and revision tracking.
INTRODUCTION
Steganographic techniques allow communication between
two authorized parties without an observer being
aware that the communication is actually taking
place. These techniques have many Army applications
in the defensive information warfare arena, such as hidden
communication, in-band captioning, and tamperproofing.
A useful steganographic system must provide
a method to embed data in an imperceptible manner,
allow the data to be readily extracted, promote a high
information rate or payload capacity, and incorporate a
certain amount of robustness to removal [1], [2].
Digit al steganography, or information-hiding schemes,
can be characterized utilizing the theories of communication
[3]. The parameters of information hiding such
as the amount of data bits that can be hidden, the
perceptibility of the message, and its robustness to re-
*Prepared through collaborative participation in the Advanced
Telecommunication/Information Distribution Research Program
(ATIRP) Consortium sponsored by the U.S. Army Research Laboratory
under Cooperative Agreement DAAL01-96-2-OO02
moval can be related to the characteristics of communication
systems: capacity, signal-to-noise ratio (SNR],
and jamming margin. The notion of payload capacity
in data hiding indicates the total number of bits hidden
and successfully recovered by the stegosystem. The
signal-to-noise ratio serves as a measure of detectability.
In this context, the message we are trying to conceal
— the embedded signal — represents the informationbearing
signal, and the cover image is viewed as noise.
Contrary to typical communication scenarios where a
high SNR is desired, a very low SNR for a stegosystem
corresponds to lower perceptibility and therefore
greater success when concealing the embedded signal.
The measure of jamming resistance can be used to describe
a level of robustness to removal or destruction of
the embedded signal, intentional or accidental,
It is not possible to simultaneously maximize robustness,
imperceptiveness, and capacity. Therefore, the
acceptable balance of these items must be dictated by
the application. For example, an information-hiding
scheme may forgo robustness in favor of capacity and
low perceptibility, whereas a watermarking scheme,
which may not require large capacity or low perceptibilityy,
would cert airily support increased robustness.
Finally, steganography used as a method of secret communication
would adopt the utmost imperceptiveness
while sacrificing robustness and possibly capacity.

Download full report
http://googleurl?sa=t&source=web&cd=1&ve...30_07i.pdf&ei=xzQxTvDMO7DXiAKRwt2UBg&usg=AFQjCNE9un2LimuCWMC67R0f4Ee0neGJvw&sig2=qKRTCJHjpJ3ewCXEbATGqg
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: an overview of data migration methodology pdf, robustness, sap data migration methodology ppt, topics in data migration methodology ppt, data migration methodology,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,223 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  wireless-data-communication-infrared-led seminar class 4 3,323 31-07-2013, 10:16 AM
Last Post: computer topic
  Secured Data Transmission through Network seminar surveyer 2 2,320 26-04-2013, 02:02 PM
Last Post: computer topic
  Wirelesss Data Encryptiion and Decryption using RF Communication project topics 17 11,489 03-02-2013, 10:30 PM
Last Post: mohanece401
  Enhancing Data Migration Performance via Parallel Data Compression seminar class 2 1,598 29-11-2012, 02:18 PM
Last Post: seminar details
  Facial recognition using multisensor images based on localized kernel eigen spaces seminar topics 2 3,275 27-02-2012, 01:48 PM
Last Post: seminar paper
  Patient Monitoring System and Data Acquisition Through GSM seminar class 1 2,567 24-02-2012, 01:16 PM
Last Post: seminar paper
  Data Centralization Over Networks eproject 4 4,273 14-02-2012, 02:58 PM
Last Post: seminar paper
  Automatic Segmentation of Digital Images Applied In Cardiac Medical Images seminar class 1 3,385 06-02-2012, 10:46 AM
Last Post: seminar addict
  SECURE WIRELESS DATA COMMUNICATION seminar class 1 2,906 26-01-2012, 10:47 AM
Last Post: seminar addict

Forum Jump: