Security Issues in Computer Networks and Stegnography

被引:0
|
作者
Saravanan, V. [1 ]
Neeraja, A. [2 ]
机构
[1] PSV Coll Engn & Technol, Dept Infonnat Technol, Krishnagiri, India
[2] PSV Coll Engn & Technol, Dept Comp Engn & Sci, Krishnagiri, India
关键词
Security; Capacity; Detectable Distortion; Macrobloc; Variation Range;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reduces the detectable distortion in a joint photographic experts group (JPEG) file during data hiding process, by introducing new region selection rule. The new region selection rule considers three factors, i.e., the horizontal difference (HD), vertical difference (VD) and region size (RS). The JPEG image will be split into number of blocks and each pixel in it will be examined to calculate the variations. Depends upon the variation, the amount of secret information will be hide in an image. This proposed method of information hiding will help to solve the security issues in computer networks. The experimental result scrys that, the proposed system hides approximately 45% of secret information in addition, comparing existing methods without increasing detectable distortion.
引用
收藏
页码:363 / 366
页数:4
相关论文
共 50 条
  • [1] Security of computer networks
    Verschuren, J
    [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 163 - 185
  • [2] COMPUTER SECURITY AND NETWORKING PROTOCOLS - TECHNICAL ISSUES IN MILITARY DATA COMMUNICATIONS NETWORKS
    STILLMAN, RB
    DEFIORE, CR
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (09) : 1472 - 1477
  • [3] Security Issues in Vehicular Networks
    Kim, Yeongkwun
    Kim, Injoo
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [4] Wireless Networks and Security Issues
    Vakil, Farok
    [J]. REVIEW OF BUSINESS, 2005, 26 (03): : 10 - 13
  • [5] Security issues in SCADA networks
    Igure, Vinay M.
    Laughter, Sean A.
    Williams, Ronald D.
    [J]. COMPUTERS & SECURITY, 2006, 25 (07) : 498 - 506
  • [6] Security issues in satellite networks
    Jiang Bibo
    Hu Xiulin
    [J]. SECOND INTERNATIONAL CONFERENCE ON SPACE INFORMATION TECHNOLOGY, PTS 1-3, 2007, 6795
  • [7] Security Issues in Emergency Networks
    Casoni, Maurizio
    Paganelli, Alessandro
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 2145 - 2150
  • [8] Analysis and Protection of Computer Network Security Issues
    Ju Jinquan
    Al-Absi, Mohammed Abdulhakim
    Al-Absi, Ahmed Abdulhakim
    Lee, Hoon Jae
    [J]. 2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 577 - 580
  • [9] COMPUTER SECURITY - IFIP ADDRESSES THE PRACTICAL ISSUES
    OWEN, K
    [J]. INFORMATION AGE, 1986, 8 (02): : 81 - 84
  • [10] Analysis and Discussion on Computer Network Security Issues
    Liu, Zhengliang
    Zheng, Xinyu
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 169 - 172