HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM
#1

HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING
DISCRETE WAVELET TRANSFORM



.pdf   DISCRETE WAVELET TRANSFORM.pdf (Size: 377.58 KB / Downloads: 39)

Abstract

The secure data transmission over internet is achieved using Steganography. In
this paper High Capacity and Security Steganography using Discrete wavelet
transform (HCSSD) is proposed. The wavelet coefficients of both the cover and
payload are fused into single image using embedding strength parameters alpha
and beta. The cover and payload are preprocessed to reduce the pixel range to
ensure the payload is recovered accurately at the destination.

INTRODUCTION

The development in technology and networking has posed serious threats to obtain secured data
communication. This has driven the interest among computer security researchers to overcome
the serious threats for secured data transmission. One method of providing more security to data
is information hiding. The approach to secured communication is cryptography, which deals with
the data encryption at the sender side and data decryption at the receiver side. The main
difference between steganography and cryptography is the suspicion factor. The steganography
and cryptography implemented together, the amount of security increases. The steganography
make the presence of secret data appear invisible to eaves droppers such as key loggers or
harmful tracking cookies where the users keystroke is monitored while entering password and
personal information. The Steganography is used for secret data transmission. Steganography is
derived from the Greek word steganos which means “covered” and graphia which means
“writing”, therefore Steganography means “covered writing”. In steganography the secret image is
embedded in the cover image and transmitted in such a way that the existence of information is
undetectable. The digital images, videos, sound files and other computer files can be used as
carrier to embed the information. The object in which the secret information is hidden is called
covert object.

RELATED WORK

Neil F. Johnson and sushil jajodia et al., [1] have provided several characteristics in information
hiding methods to identify the existence of a hidden messages and also identify the hidden
information. The images are reviewed manually for hidden messages and steganographic tool to
automate the process. The developed tool is to test robustness of information hiding techniques
in images such as warping, cropping rotating and blurring. Lisa M. Marvel and Charles T. Retter
[2] have presented a method of embedding information within digital images, called Spread
Spectrum Image Steganography (SSIS). SSIS conceals a message of substantial length with in
digital images while maintaining the original image size and dynamic range. A hidden message
can be recovered using the appropriate keys without any knowledge of the original image.
Giuseppe Mastronardi et al., [3] have studied the effects of Steganography in different image
formats (BMP, GIF, JPEG and DWT) and proposed two different approaches for lossless and
lossy image. They are based on the creation of an “adhoc” palette for BMP and GIF images. LUI
Tong and QIU Zheng-ding [4] have proposed a Quantization-based Steganography scheme. In
this method the secret message is hidden in every chrominance component of a color image and
the hiding capacity is higher than that of the popular Steganography software.
Reply
#2

to get information about the topic "high capacity and security steganography using discrete wavelet transform" full report ppt and related topic refer the page link bellow

http://studentbank.in/report-high-capaci...e=threaded

http://studentbank.in/report-steganograp...e=threaded

http://studentbank.in/report-image-stega...e=threaded

http://studentbank.in/report-image-stega...-transform
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: high capacity dna bsed stegnography, high capacity lossless secure image steganography using wavelets, high capacity dna based, steganography using discrete wavelet transform code, digital video watermarking using discrete wavelet transformdigital video watermarking using discrete wavelet transformdigital, high capacity 3d steganography, steganography based on the integer wavelet transform and genetic algorithm,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,146 31-01-2015, 11:55 PM
Last Post: Guest
Lightbulb Ditgital Steganography seminar projects crazy 3 3,150 23-09-2013, 11:34 AM
Last Post: computer topic
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,356 20-09-2013, 10:52 AM
Last Post: computer topic
  Android Mobile Security – An Issue of Future computer girl 2 2,390 24-08-2013, 10:26 AM
Last Post: computer topic
  BLOOD VESSEL ENHANCEMENT AND SEGMENTATION USING WAVELET TRANSFORM science projects buddy 3 5,469 04-08-2013, 10:21 PM
Last Post: Guest
  VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES seminar class 8 5,694 11-02-2013, 11:42 AM
Last Post: Guest
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,728 06-02-2013, 10:02 AM
Last Post: seminar details
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,045 10-01-2013, 05:30 PM
Last Post: Guest
  A Digital Watermark Based on The Wavelet Transform and its Robustness on Image project topics 1 2,343 19-12-2012, 11:48 AM
Last Post: seminar details
Music High Speed OFDM Packet Access Computer Science Clay 1 1,879 08-12-2012, 02:44 PM
Last Post: seminar details

Forum Jump: