International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 142 | Views: 286

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.7 / 10


     

Secure Spread Spectrum Data Embedding and Extraction

Vaibhav Dhore, Pathan Md. Arfat


Abstract: Embedding the secrete data into the digital media like image, video audio is rapidly growing technology from the commercial as well as national security perspective. From the past few years the only the presence of the embedded data intensively investigated which is called passive detection. While the active hidden data extraction is relatively new branch in research. This paper gives the survey of the methods for embedding the data using direct sequence spread spectrum technique and gives the method for blindly extracting the hidden data embedded over a wide band of spectrum or transformed domain of digital medium. To extract the hidden data blindly we have used the Multi Carrier Iterative Generalized Least square (M-IGLS) procedure to seek the unknown data hidden in the image host. Neither the original host nor the embedding carriers assumed available. Then to enhance the MIGLS we have used the Cross Correlation MIGLS (CC-MIGLS) procedure, which leads to most effective hidden message recovery by performing the statistical analysis of repeated independent MIGLS processing of the host.


Keywords: Steganalysis, steganography, data hiding, data embedding, cross correlation, blind detection, spread spectrum embedding, watermarking


Edition: Volume 4 Issue 1, January 2015


Pages: 743 - 747



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vaibhav Dhore, Pathan Md. Arfat, "Secure Spread Spectrum Data Embedding and Extraction", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 743-747, https://www.ijsr.net/getabstract.php?paperid=SUB15291, DOI: https://www.doi.org/10.21275/SUB15291



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article



Top