Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/427561
Title: A reinforce optimization using Enhanced algorithms based stego Analysis for image transformation
Researcher: Dhanasekaran, K
Guide(s): Anandan, P and Kumaratharan, N
Keywords: Engineering and Technology
Computer Science
Telecommunications
stego Analysis
image transformation
University: Anna University
Completed Date: 2022
Abstract: Data security and privacy are one of the important criteria of our digital newlinelife. Nowadays internet acts as a communication medium for transmitting data. newlineBut the priority is given to the sensitive data at the time of transmission via the newlineinternet and this should happen only with the development of the internet. The newlinewell-known and developed model to hide the data is image steganography and newlinealso transferred data security level is verified by this method. In this method, newlineability of the image is high, and also with the help of the internet, we can easily newlineaccess the cover images. Rapid use of the internet is most important to find out newlinethe novel steganography method to transfer the secret data with high capacity newlineand also high security to avoid attacks. There is a lot of existing steganography newlinemethods. But every method has some drawbacks, for that drawback the attack newlinecan be done by third parties to decrypt the secret data or erase the data or make newlinedamage in the cover image. In our work, we analyze the existing steganography newlinealgorithm and its drawback and also analysis the attack to the cover image. After newlinethe analysis, a new and enhanced steganographic approach was proposed with newlinethree criteria for secure transmission. The new proposed system is focused on newlineedge detection, chaotic function, and modulus mapping. The detection of edges newlinein the image is hiding the data in the image and creates stego-image by newlineaddressing edge opacity disadvantage. The function which is used to increase the newlinecomplexity level to the third parties to extract the hidden information this newlineprocess is known as a chaotic function newline
Pagination: xiii, 120p.
URI: http://hdl.handle.net/10603/427561
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File152.01 kBAdobe PDFView/Open
02_prelim pages.pdf2.6 MBAdobe PDFView/Open
03_content.pdf2.72 MBAdobe PDFView/Open
04_abstract.pdf2.72 MBAdobe PDFView/Open
05_chapter 1.pdf2.73 MBAdobe PDFView/Open
06_chapter 2.pdf2.73 MBAdobe PDFView/Open
07_chapter 3.pdf2.72 MBAdobe PDFView/Open
08_chapter 4.pdf2.73 MBAdobe PDFView/Open
09_chapter 5.pdf2.73 MBAdobe PDFView/Open
10_chapter 6.pdf2.73 MBAdobe PDFView/Open
11_annexures.pdf148.24 kBAdobe PDFView/Open
80_recommendation.pdf102.21 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: