Advanced techniques for covert communication

dc.contributor.guideK B Shiva Kumar
dc.coverage.spatial
dc.creator.researcherAnitha devi M D
dc.date.accessioned2022-02-18T05:27:49Z
dc.date.available2022-02-18T05:27:49Z
dc.date.awarded2019
dc.date.completed2019
dc.date.registered2014
dc.description.abstractThe technique of covert communication addresses the issues relating to optimality of undetectable and secured communication of confidential sensitive information over an insecure public communication channels. Advancement in digital communication and networking has posed a serious threat to secure data transmission. It is the confidential information that flows via network fuels the engine of global economy. In order to ensure secure data communication and highly sensitive confidential information does not reach unauthorized destination, the concept of covert communication has attracted many researchers to come up with innovative and creative solutions to secure confidential information from falling into hands of unauthorized intruders. newline newlineSteganography is an art and also a science of embedding secret sensitive information into a host data set in such a manner that its existence cannot be identified. Here emphasis is given to Reversible Data Hiding techniques. Reversible Data Hiding can be considered as a special form of information embedding technique, which facilitates greater possibility of applications to link two different sets of information in such a manner that cover mediums can be retrieved in a lossless fashion after the embedded messages are extracted. Reversible data hiding employs the use of redundancy in carrier medium. These techniques play a major role in medical imaging, military applications and remote sensing, which demands lossless restoration of carrier medium information after the embedded confidential information is retrieved, while protecting the confidentiality of payload information. newlineLossless data hiding scheme proposed in this thesis for color cover images exploits least computational complexity by using histogram shifting technique to embed sensitive information bits in confused host image blocks. Confusion in cover image is a result of quad tree decomposition. newline
dc.description.note
dc.format.accompanyingmaterialDVD
dc.format.dimensions35
dc.format.extent15016kb
dc.identifier.urihttp://hdl.handle.net/10603/363617
dc.languageEnglish
dc.publisher.institutionElectronics and Communication Engineering
dc.publisher.placeTumkur
dc.publisher.universitySri Siddhartha Academy of Higher Education
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordEngineering
dc.subject.keywordEngineering and Technology
dc.subject.keywordEngineering Electrical and Electronic
dc.titleAdvanced techniques for covert communication
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 13
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
30.76 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_certificate.pdf
Size:
6.93 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_preliminary pages.pdf
Size:
45.19 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_chapter 1.pdf
Size:
263.55 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter 2.pdf
Size:
57.88 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: