Proceedings of 2009 12th International Conference on information processing system and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh Variable pasture Steganography in gray-haired Scale Digital Images Using propinquity Pixel Information Moazzam Hossain, Sadia Al Haque, Farhana Sharmin Department of Computer attainment & Engineering, International Islamic University Chittagong, Bangladesh mhmilon@yahoo.com, sah_40760@yahoo.com, farhana_iiuc@yahoo.com cop In order to repair the security by providing the stego chain of mountains with imperceptible type, third polar steganographic methods for gray level images atomic get on 18 presented in this paper. Four Neighbors, oblique Neighbors and Eight Neighbors methods ar active in our scheme. These methods utilize a pixels colony on its neighborhood and psycho visual redundancy to train the radiate areas and edged areas in the image. In smooth areas we implant three bits of hugger-mugge r information. In the edged areas, variable esteem bits are embedded. From the experimental results it is seen that the proposed methods achieve a much higher(prenominal) visual quality as indicated by the high salad days Signal-toNoise Ratio (PSNR) in spite of hiding a big number of reclusive bits in the image.

In addition, to embed this king-size amount of underground information, at most only half of the total number of pixels in an image is used. Moreover, extraction of the secret information is freelancer of original cover image. Keywords: Steganography, Four Neighbors, Diagonal Neighbors, Eight Neighbors, whirligig Signal-to-N oise Ratio. I. INTRODUCTION The advent of e! arnings along with keep made by digital engineering gave the world of chat a new dimension. Exchange of digital documents, images, audio and level video via Internet is fast, cheap and simple. This assuagement of communication brought along with it, problems of security. Digital media are easy to intercept, forge, tamper, transcript and distribute illegally. Thus, issues relations with digital data security and...If you extremity to get a full essay, order it on our website:
BestEssayCheap.comIf you want to get a full essay, visit our page:
cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.