Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/255642
Title: Developing Hybrid Algorithm For Secure Data Transmission Through Multimedia
Researcher: S. Nanda Kishor
Guide(s): Kodandaramaiah G. N.
Keywords: Engineering and Technology,Engineering,Engineering Electrical and Electronic
University: Jain University
Completed Date: 13/02/2019
Abstract: Digital India is a programme to prepare India for a knowledge future. It is a newlineprogramme to transform India into digital empowered society and knowledge newlineeconomy. Its main aim is to make all the databases and information electronic. So newlineinternet and digital media are getting more and more popular. Digital data can be newlinetransmitted in a fast and economical manner through data communication networks newlinewithout losing quality. Digital media offer distinct benefits over analog media. The newlinequality of digital audio, images and video signals are better than that of their analog newlinecounterparts. Editing is easy in digital media, because one can access the exact newlinediscrete locations that need to be changed. Copying is simple with no loss of fidelity newlineand a copy of a digital media is identical to the original. With digital multimedia newlinedistribution over World Wide Web, Intellectual Property Right (IPR) are more newlinethreatened than ever due to the possibility of unlimited copying. The hackers and newlinemalware makes the data transmission insecure. So requirement of secure transmission newlineof data also increased. Some solution are introduced how to pass information in a newlinemanner that the very existence of the message is unknown in order to repel attention newlineof the potential attacker. Besides hiding data for confidentiality, this approach of newlineinformation hiding can be extended to copyright protection for digital media. newlineThe aim of the research work is to insert secrete information in obscure way. newlineSteganography is a technique of embedding secret information in the cover object to newlinegenerate stego object, which is almost same as cover object. Steganography does not newlineattract intruders as in the case of cryptography technique. Recently, many algorithms newlineof steganography and data hiding have been proposed. Concurrently, many of the newlinepowerful steganographic analysis software programs have been provided to newlineunauthorized users to retrieve the valuable secret information that was embedded in newlinex newlinethe carrier files. Some steganography algorithms can be easily detected by newlinesteganalytical detectors because of the lack of security and embedding efficiency. The newlinebasic requirements of data hiding in Multimedia files using steganography are newlineUndetectability, Capacity and Imperceptibility. Apart from these, Security, robustness newlineagainst statistical attacks and cover-carrier attacks are some other important newlinecharacteristics of steganography. newlineAs of now the greater part of the steganography algorithms are by changing newlinethe Least Significant Bit (LSB) of the consecutive locations of the cover medium to newlinestore the secret information. The inadequacy of this algorithm is that hidden message newlinecan be recovered effectively through steganalysis since the messages are stored in newlineconsecutive locations. In this research work, a Hybrid data hiding scheme is newlinedeveloped by LSB method and polynomial equation. By applying Polynomial method newlineto cover object using Hash LSB method, the length of hidden messages will be newlineincreased. In this method, the location of the cover object where the secret message is newlineto be stored is chosen haphazardly. newlineA comparative study is presented between the proposed algorithms and the newlineexisting algorithms. Experimental results show that the stego-object is visually newlineindistinguishable from the original cover-object. The obtained results also show a newlinesignificant improvement with respect to a previous work. Performance of proposed newlinemethod was evaluated using Normalized correlation, Peak signal to noise ratio, newlineStructural Content and Histogram error ratio. newline
Pagination: 156 p.
URI: http://hdl.handle.net/10603/255642
Appears in Departments:Dept. of Electronics Engineering

Files in This Item:
File Description SizeFormat 
1.cover page.pdfAttached File27.37 kBAdobe PDFView/Open
2.certificate.pdf6.8 kBAdobe PDFView/Open
3. table of contents.pdf12.21 kBAdobe PDFView/Open
4.chapter_1.pdf135.42 kBAdobe PDFView/Open
5.chapter_2.pdf98.5 kBAdobe PDFView/Open
6.chapter_3.pdf244.66 kBAdobe PDFView/Open
7.chapter_4.pdf1.36 MBAdobe PDFView/Open
8.chapter_5.pdf9.61 MBAdobe PDFView/Open
9.chapter_6.pdf11.84 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: