International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 291

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013 | Popularity: 6.7 / 10


     

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal


Abstract: This paper presents a new frequency domain approach for steganography algorithm. The proposed system proved to be more robust than the existing systems and calculates its PSNR, MSE, CER and Correlation coefficient. This paper also analyse the Least Significant Bit (LSB) spatial domain based Steganography and Discrete Cosine Transform (DCT) frequency domain based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. In DCT technique, message is hidden in more significant areas of cover image. An implementation of both these methods and DCT based proposed method with their performance analysis ( in terms of PSNR) has been done in this paper. Also different types of attacks such as salt and pepper noise has been applied. In these techniques, a trade-off between the amount of data to be hidden and the robustness of the image will be observed


Keywords: Least Significant Bit LSB, Discrete Cosine Transform DCT, PSNR, LSB


Edition: Volume 2 Issue 5, May 2013


Pages: 266 - 270



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ajit Singh, Swati Aggarwal, "Data Security through more robust DCT based methodology and Assessment in terms of PSNR", International Journal of Science and Research (IJSR), Volume 2 Issue 5, May 2013, pp. 266-270, https://www.ijsr.net/getabstract.php?paperid=IJSRON1201368, DOI: https://www.doi.org/10.21275/IJSRON1201368



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 149 - 154

Noise Analysis and Removal Using Fuzzy Mean Filter with Triangular Membership Function

R. Pradeep Kumar Reddy

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article



Top