Downloads: 110 | Views: 295
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.9 / 10
Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding
Shreya M. S., Sandeep Kumar S
Abstract: Nowadays digital communication has become an essential part of our daily activities. A lot of applications are internet-based and it is important that communication be made secret especially if it involves exchange of confidential information. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are required to protect against unauthorized access and use. This has led to an unstable growth in the field of information hiding. Cryptography and steganography are the two popular methods available to provide security. Using cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image without affecting the quality of the image and that image will be transmitted. This paper proposes a new method for embedding the data inside the image using ordinal virtual embedding technique and also modification of data.
Keywords: Cryptography, Feedback shift, MLSB, Ordinal Virtual Embedding, Reversible Data Hiding, Steganography, Separable Reversible Data Hiding
Edition: Volume 4 Issue 4, April 2015
Pages: 3099 - 3106
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2002
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 699
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera