Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/331494
Title: | Performance enhancement of stegano visual cryptography using hybrid heuristic techniques |
Researcher: | Gurunathan K |
Guide(s): | Rajagopalan S P |
Keywords: | Engineering and Technology Computer Science Automation and Control Systems stegano visual cryptography |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | The aim of Steganography is to communicate information which is concealed within an alternative message which is noticeable thus protecting the information. It is a data hiding technique which sets secret data within the cover media for hiding its presence. Audio, video, image and text have been applied in order to hide information in steganography. Multimedia steganography is an extremely secure steganography by using secret messages found in bits that are the lowest in the noisy files. The JPEG images consist of several different colour spectra and thus do not reflect much. The technique of steganography is applied to image files for hiding encrypted messages and their corresponding formats in order to get different cryptographic systems. Bit insertion refers to image steganography and its maximum use where the pixel s Least Significant Bit (LSB) has been altered. Cryptography tends to encrypt messages to ensure that they are not easily understood and steganography hides data in such a way that it cannot be easily observed. There is a technique of cryptography known as Visual cryptography (VC) that permits visuals to be encrypted to ensure that decryption is made by the human visual system. There are various techniques of steganography that employ colour composition, sorting of palettes of colour, identifying the relationship between the various colour indices, exaggerated noise, and luminance. The JPEG-JSTEG is one recognized tool for industrial information hiding. It is a distinctive type of a steganographic algorithm that uses a JPEG file as its cover-image. This will replace the LSB for the quantized Discrete Cosine Transform (DCT) coefficients having secret messages newline |
Pagination: | xiii, 140p. |
URI: | http://hdl.handle.net/10603/331494 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 27.44 kB | Adobe PDF | View/Open |
02_certificates.pdf | 173.36 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 929.71 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 125.23 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 246.25 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 2.81 MB | Adobe PDF | View/Open | |
07_contents.pdf | 162.08 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 6.94 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 144.4 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 14.75 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 429.41 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 351.06 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 473.11 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 580.02 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 707.47 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 258.73 kB | Adobe PDF | View/Open | |
17_references.pdf | 348.75 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 244.96 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 79.74 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: