Security Building at the Line of Control for Image Stego
Author(s) -
mr. Rengarajan,
Rengarajan Amirtharajan,
B. Parameswaran Bose,
Sasidhar Imadabathuni,
John Bosco,
John Bosco Balaguru Rayappan
Publication year - 2010
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/1671-2252
Subject(s) - computer science , steganography , line (geometry) , control (management) , computer security , image (mathematics) , artificial intelligence , mathematics , geometry
has virtually become an indispensable nonfunctional requirement for any technology that deals with data. Traditional methods of imparting security using encryption have given away themselves long ago to cryptanalytic ventures. A different method of secure data transfer without revealing the mere existence of secret, called Steganography is a promising technique to ensure security. This technique camouflages secret data into a casual cover image, without affecting its visually perceived quality. This paper proposes a novel technique, which is a hybrid of cryptography, edge detection and steganography. By differentially embedding secret data into edges and smooth pixels of cover image, so that edge pixels and smooth pixels have data with different encryptions, the cryptic effect can be boosted to a greater limit, making the unauthorized extraction of secret data impossible.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom