Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/461871
Title: | Secure Communication Using Data Hiding With Encryption Techniques |
Researcher: | Gulappagol, Laxmi |
Guide(s): | Shivakumar, K B |
Keywords: | Engineering Engineering and Technology Engineering Electrical and Electronic |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2020 |
Abstract: | Security in this modern age of electronic network is of higher prominence throughout newlinethe world. The network connection through the systems such as computer and mobile phones newlinehas predominant effect on data communication and its security. There are several literatures newlinethat explains about the secure communication using data hiding with encryption techniques. newlineVarious algorithms have been used at both encryption and decryption ends. Researchers have newlineachieved a reasonable degree of legitimacy in data communication through network with the newlineuse of secure communication techniques of cryptography, steganography and watermarking. newlineHowever, it is observable that increased degree of attainment is possible in basic parameters newlineof secured communication such as confidentiality, integrity and availability to achieve newlinerobustness against various attacks. Numerous tools are available to cover the gap in the newlineresearch and to enhance the data hiding ability using various techniques. An attempt has been newlinemade to provide efficient data hiding techniques, as still there is wide scope for improvements newlineto secure digital data such as image. Various approaches have been developed to embed high newlinevolume of information without incurring any perceptual distortion, and achieve robustness newlineagainst compression, additive noise and image tampering attacks thus minimizing the noise in newlineorder to achieve better information hiding in images/video. newlineIn the beginning of research, all the three techniques of cryptography, watermarking and newlinesteganography in both spatial and frequency domain are applied for data hiding using LSB and newlineDCT algorithms. Depending on the user demand for the above techniques, proposed model newlinewill perform either DCT or LSB algorithms. This method is specially used for image security. newlineThe image qualities are represented by Peak Signal to Noise Ratio (PSNR). Numerical newlinecomputing is done using MATLAB. Steganography and Cryptography are proved to be newlinesuperior with higher magnitude of PSNR under LSB technique. However, invisible |
Pagination: | 111 |
URI: | http://hdl.handle.net/10603/461871 |
Appears in Departments: | Department of Electronics and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 403.64 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 535.16 kB | Adobe PDF | View/Open | |
03_content.pdf | 181.25 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 124.57 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 416.15 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 287.14 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 498.24 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.37 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 321.86 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 278.65 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 626.23 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 951.53 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 10.8 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: