Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/331494
Title: Performance enhancement of stegano visual cryptography using hybrid heuristic techniques
Researcher: Gurunathan K
Guide(s): Rajagopalan S P
Keywords: Engineering and Technology
Computer Science
Automation and Control Systems
stegano visual
cryptography
University: Anna University
Completed Date: 2020
Abstract: The aim of Steganography is to communicate information which is concealed within an alternative message which is noticeable thus protecting the information. It is a data hiding technique which sets secret data within the cover media for hiding its presence. Audio, video, image and text have been applied in order to hide information in steganography. Multimedia steganography is an extremely secure steganography by using secret messages found in bits that are the lowest in the noisy files. The JPEG images consist of several different colour spectra and thus do not reflect much. The technique of steganography is applied to image files for hiding encrypted messages and their corresponding formats in order to get different cryptographic systems. Bit insertion refers to image steganography and its maximum use where the pixel s Least Significant Bit (LSB) has been altered. Cryptography tends to encrypt messages to ensure that they are not easily understood and steganography hides data in such a way that it cannot be easily observed. There is a technique of cryptography known as Visual cryptography (VC) that permits visuals to be encrypted to ensure that decryption is made by the human visual system. There are various techniques of steganography that employ colour composition, sorting of palettes of colour, identifying the relationship between the various colour indices, exaggerated noise, and luminance. The JPEG-JSTEG is one recognized tool for industrial information hiding. It is a distinctive type of a steganographic algorithm that uses a JPEG file as its cover-image. This will replace the LSB for the quantized Discrete Cosine Transform (DCT) coefficients having secret messages newline
Pagination: xiii, 140p.
URI: http://hdl.handle.net/10603/331494
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File27.44 kBAdobe PDFView/Open
02_certificates.pdf173.36 kBAdobe PDFView/Open
03_vivaproceedings.pdf929.71 kBAdobe PDFView/Open
04_bonafidecertificate.pdf125.23 kBAdobe PDFView/Open
05_abstracts.pdf246.25 kBAdobe PDFView/Open
06_acknowledgements.pdf2.81 MBAdobe PDFView/Open
07_contents.pdf162.08 kBAdobe PDFView/Open
08_listoftables.pdf6.94 kBAdobe PDFView/Open
09_listoffigures.pdf144.4 kBAdobe PDFView/Open
10_listofabbreviations.pdf14.75 kBAdobe PDFView/Open
11_chapter1.pdf429.41 kBAdobe PDFView/Open
12_chapter2.pdf351.06 kBAdobe PDFView/Open
13_chapter3.pdf473.11 kBAdobe PDFView/Open
14_chapter4.pdf580.02 kBAdobe PDFView/Open
15_chapter5.pdf707.47 kBAdobe PDFView/Open
16_conclusion.pdf258.73 kBAdobe PDFView/Open
17_references.pdf348.75 kBAdobe PDFView/Open
18_listofpublications.pdf244.96 kBAdobe PDFView/Open
80_recommendation.pdf79.74 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: