Proceedings of 2009 12th International Conference on education processing system and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh Variable assess Steganography in gray-haired Scale Digital Images Using contiguity Pixel Information Moazzam Hossain, Sadia Al Haque, Farhana Sharmin Department of Computer acquirement & Engineering, International Islamic University Chittagong, Bangladesh mhmilon@yahoo.com, sah_40760@yahoo.com, farhana_iiuc@yahoo.com cop In order to correct the security by providing the stego chain of mountains with imperceptible lineament, trey contrastive steganographic methods for gray level images atomic outcome 18 presented in this paper. Four Neighbors, oblique Neighbors and Eight Neighbors methods are active in our scheme. These methods utilize a pixels colony on its neighborhood and psycho visual redundancy to train the polish areas and edged areas in the image. In smooth areas we implant three bits of hug ger-mugger information. In the edged areas, variable esteem bits are embedded. From the experimental results it is seen that the proposed methods achieve a much higher(prenominal) visual quality as indicated by the high salad days Signal-toNoise Ratio (PSNR) in spite of hiding a big number of unfathomed bits in the image.

In addition, to embed this king-size amount of recondite information, at most only half of the total number of pixels in an image is used. Moreover, extraction of the secret information is mugwump of original cover image. Keywords: Steganography, Four Neighbors, Diagonal Neighbors, Eight Neigh bors, flowering Signal-to-Noise Ratio. I. I! NTRODUCTION The advent of earnings along with draw close made by digital engineering gave the world of communication a new dimension. Exchange of digital documents, images, audio and til now video via Internet is fast, cheap and simple. This assuagement of communication brought along with it, problems of security. Digital media are easy to intercept, forge, tamper, transcript and distribute illegally. Thus, issues dealing with digital data security and...If you extremity to get a full essay, order it on our website:
BestEssayCheap.comIf you want to get a full essay, visit our page:
cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.