International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 273

Dissertation Chapters | Electronics & Communication Engineering | India | Volume 5 Issue 10, October 2016 | Popularity: 6.9 / 10


     

A Practical Quality-Aware Image Quality Analysis System

Duleshwari Gajanan Wankhade, R. D. Sushir


Abstract: In this paper the focus is on maintaining secrecy between two communication parties using steganography and cryptography technique. In this system cover data (Image) and secret data (Image / Text) by using DWT (Discrete wavelet transform) then secret data is first embedded in to cover image by using LSB (Least Significant Bits) algorithm and then resulted embedded image by using IDWT (Inverse Discrete Wavelets Transform) algorithm to form Stego-image. Then DWT (Discrete Wavelets Transform) algorithm on the stego image then resulted image by using LSB extraction to form recovered secret data. For the analysis of the proposed method MSE, RMSE, PSNR, Correlation and SNR was calculated for each of the cover and recovered secret data. The DWT (Discrete Wavelets Transform) algorithm is found to be better in the terms of efficiency, robustness, highly security and embedding capacity. With rapid growth of World Wide Web and advance computer network, we need security, privacy, integrity and authentication in the data communication. A steganography is art of hiding sensitive information in another cover medium. The main objective of this paper is to achieve quality and secure communication.


Keywords: Steganography, Cryptography, LSB, DWT, Security, MSE, PSNR, Correlation


Edition: Volume 5 Issue 10, October 2016


Pages: 1283 - 1290



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Duleshwari Gajanan Wankhade, R. D. Sushir, "A Practical Quality-Aware Image Quality Analysis System", International Journal of Science and Research (IJSR), Volume 5 Issue 10, October 2016, pp. 1283-1290, https://www.ijsr.net/getabstract.php?paperid=17011601, DOI: https://www.doi.org/10.21275/17011601



Similar Articles

Downloads: 0

Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022

Pages: 143 - 144

Blockchain Based Access Control System for Cloud Storage

Kamisetty Vinay

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1015 - 1019

A High Performance Data Encryption and Masking Using AES Algorithm

Poornima TN, Dr. Somashekar K

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022

Pages: 1295 - 1299

Implementation of Elliptic Curve Cryptography Processor for FPGA Applications

Ch. Venkateswarlu, Nirmala Teegala

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Electronics & Communication Engineering, India, Volume 12 Issue 9, September 2023

Pages: 1388 - 1394

Design of Low-Cost Stochastic Number Generator Using TSPC Logic in 45nm Technology

Pavan PH, Lalitha S

Share this Article

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article
Top