Image steganography approach for secure data communication

dc.contributor.guideK B Shivakumar and Rajendra Kumar Das
dc.coverage.spatial
dc.creator.researcherShyla M K
dc.date.accessioned2022-03-22T11:08:51Z
dc.date.available2022-03-22T11:08:51Z
dc.date.awarded2021
dc.date.completed2021
dc.date.registered2015
dc.description.abstractResearch in information security is becoming more and more important and the newlinesteganography technique is significantly used to transmit secret information. In recent newlinedays, for sending secret messages, we require secure internet. Image steganography is newlineconsidered as the eminent tool for data hiding which provides better security for the data newlinetransmitted over internet and also it is an emerging security technique to secure newlineinformation related to Internet of Things. The sensitive data transferred or stored in the newlinecloud storage has to be protected from the fraudulence. Any sensitive data from base newlinestation or an IoT device can be securely stored in cloud so that only intended user could newlineaccess by using image steganography techniques which gives authentication. newlineThe researcher makes an attempt to provide security to the confidential data using DCT newlineand Compressed Sensing algorithm in her early stage of research. RGB color planes are newlineextracted and then DCT is applied in order to decrease the redundant information. Then newlinethe compressed image is embedded using selective keys generated. At receiver side the newlinecompressive sensing reconstruction algorithm is used to reconstruct the secret image. newlineThe proposed method results in significant improvements with high PSNR value and newlinepayload capacity. newlineIn the second approach, the researcher makes use of Modulo-4 addition technique by newlineconsidering two least significant bits from each pixel of the carrier image for mapping newlineand addition. Two bits of payload data can be embedded in one cover image pixel hence newlineenhanced the hiding capacity. A mapping function for addition is applied on 1st and 2nd newlinebits of cover image pixel, and required mapping table is constructed in the algorithm newlinewhich gives the solution for data hiding and extraction. In the next approach, the newlinetechnique used is based on DCT and shuffling of payload data before embedding is newlineconsidered. The percentage of compression is decided based on the quality of a payload newlineimage required for transmission.
dc.description.note
dc.format.accompanyingmaterialDVD
dc.format.dimensions35
dc.format.extent15016kb
dc.identifier.urihttp://hdl.handle.net/10603/369357
dc.languageEnglish
dc.publisher.institutionElectronics and Communication Engineering
dc.publisher.placeTumkur
dc.publisher.universitySri Siddhartha Academy of Higher Education
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordEngineering
dc.subject.keywordEngineering and Technology
dc.subject.keywordEngineering Electrical and Electronic
dc.titleImage steganography approach for secure data communication
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 12
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
47.63 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_certificate.pdf
Size:
14.88 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_preliminary pages.pdf
Size:
77.79 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_chapter 1.pdf
Size:
1.18 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter 2.pdf
Size:
633.71 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: