Secured High Capacity Steganography using Distribution Technique with Validity and Reliability

被引:0
|
作者
Tyagi, Sanjive [1 ]
Sexena, Ashendra [1 ]
Garg, Sohan [2 ]
机构
[1] Teerthanker Mahaveer Univ, Coll Comp Sci & Informat Technol, Moradabad, India
[2] CCS Univ, Sir Chotu Ram Inst Engn & Technol, Meerut, Uttar Pradesh, India
关键词
Steganography; Distortion; Randomized LSB; Distribution; Decomposed Files; WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the huge quantity of information streaming over the Internet, governments and privately owned businesses need to locate a possible approach to decline the dangerous messages and agendas. Challenges are increasing as digital property theft, breaking the copyright act, illegal reproduction of digitized information, communication for criminal activities etc. The Steganography is one of the major fields of study to control the malicious activities on internet. Steganography techniques when applied leave an unintended distortion in the cover file which have to be minimized and improve the capacity of hidden secrete data. The objectives of this paper are to study and review embedding capacity techniques that can be implanted without the debasement of visual nature of digital picture and usage of Steganography technique in designing robust and reliable security system.
引用
收藏
页码:109 / 114
页数:6
相关论文
共 50 条
  • [1] High capacity and secured methodologies for steganography
    Tiwari, Rajesh Kumar
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (01) : 1 - 18
  • [2] Efficient High Capacity Steganography Technique
    Abdulla, Alan Anwer
    Jassim, Sabah A.
    Sellahewa, Harin
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [3] Developing a Highly Secure and High Capacity LSB Steganography Technique using PRNG
    Deo, Chandra Kumar
    Singh, Asmita
    Singh, Deepak Kumar
    Soni, Nitesh Kumar
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2020), 2020, : 136 - 140
  • [4] High Capacity Video Steganography Technique in Transform Domain
    Hemalatha, S.
    Acharya, U. Dinesh
    Renuka, A.
    [J]. PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2016, 24 (02): : 411 - 422
  • [5] HIGH CAPACITY STEGANOGRAPHY TECHNIQUE BASED ON WAVELET TRANSFORM
    Divya, V.
    Sasirekha, N.
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [6] An Efficient Video Steganography Technique for Secured Data Transmission
    Job, Dhanya
    Paul, Varghese
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA MINING AND ADVANCED COMPUTING (SAPIENCE), 2016, : 303 - 310
  • [7] A Payload Distribution Method for High Capacity Image Steganography
    Rathor, Sandeep
    Tripathi, S. P.
    Chakraborty, Soumendu
    Jalal, A. S.
    [J]. 2013 4TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT), 2013, : 43 - 47
  • [8] Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security
    Moon, Sunil. K.
    Raut, Rajeshree. D.
    [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 660 - 665
  • [9] A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography
    Devi, Anitha M. D.
    Kumar, K. B. Shiva
    [J]. INTERNATIONAL CONFERENCE ON MATERIALS, ALLOYS AND EXPERIMENTAL MECHANICS (ICMAEM-2017), 2017, 225
  • [10] High capacity reversible and secured data hiding in images using interpolation and difference expansion technique
    Pratap Chandra Mandal
    Imon Mukherjee
    Biswa Nath Chatterji
    [J]. Multimedia Tools and Applications, 2021, 80 : 3623 - 3644