Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/427561
Title: | A reinforce optimization using Enhanced algorithms based stego Analysis for image transformation |
Researcher: | Dhanasekaran, K |
Guide(s): | Anandan, P and Kumaratharan, N |
Keywords: | Engineering and Technology Computer Science Telecommunications stego Analysis image transformation |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | Data security and privacy are one of the important criteria of our digital newlinelife. Nowadays internet acts as a communication medium for transmitting data. newlineBut the priority is given to the sensitive data at the time of transmission via the newlineinternet and this should happen only with the development of the internet. The newlinewell-known and developed model to hide the data is image steganography and newlinealso transferred data security level is verified by this method. In this method, newlineability of the image is high, and also with the help of the internet, we can easily newlineaccess the cover images. Rapid use of the internet is most important to find out newlinethe novel steganography method to transfer the secret data with high capacity newlineand also high security to avoid attacks. There is a lot of existing steganography newlinemethods. But every method has some drawbacks, for that drawback the attack newlinecan be done by third parties to decrypt the secret data or erase the data or make newlinedamage in the cover image. In our work, we analyze the existing steganography newlinealgorithm and its drawback and also analysis the attack to the cover image. After newlinethe analysis, a new and enhanced steganographic approach was proposed with newlinethree criteria for secure transmission. The new proposed system is focused on newlineedge detection, chaotic function, and modulus mapping. The detection of edges newlinein the image is hiding the data in the image and creates stego-image by newlineaddressing edge opacity disadvantage. The function which is used to increase the newlinecomplexity level to the third parties to extract the hidden information this newlineprocess is known as a chaotic function newline |
Pagination: | xiii, 120p. |
URI: | http://hdl.handle.net/10603/427561 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 152.01 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.6 MB | Adobe PDF | View/Open | |
03_content.pdf | 2.72 MB | Adobe PDF | View/Open | |
04_abstract.pdf | 2.72 MB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 2.73 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 2.73 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 2.72 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 2.73 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 2.73 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 2.73 MB | Adobe PDF | View/Open | |
11_annexures.pdf | 148.24 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 102.21 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: