Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/513236
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-09-22T06:32:15Z-
dc.date.available2023-09-22T06:32:15Z-
dc.identifier.urihttp://hdl.handle.net/10603/513236-
dc.description.abstractIn the modern world of communication, data security plays a newlinevital role as the data is transmitted securely over the internet from one newlineplace to another. Cryptography protects the data from unauthorized newlineusers by applying mathematical formulae and making the information newlineinto some scramble codes. In steganography, the information to be newlinetransferred is concealed into an image in such a manner that the message newlinecan be viewed only by the authorized users. The message is not used by newlineany other party actively or passively. The data communication in the newlineinternet needs new steganographic algorithms to find the optimal newlinelocation in the image where the data can be concealed. The researchers newlineproposed a number of algorithms for the above purpose, but the new newlinealgorithms give promising results. The Sobel operator is incorporated newlinewith Edge Adaptive Least Significant Bit Matching Revisited newline(EALSBMR) which provides fast and reliable results with good newlinecompression ratio as compared with the existing Algorithms. The edges newlineare accurately detected by the Sobel operator that makes the algorithm newlineto perform better. Moreover, different bio inspired algorithms are newlineexperimented to find the optimal solutions, as these algorithms are newlineemerging technologies and based on the principles and inspiration of newlinebiological evolution of nature to design and implement new robust newlinealgorithms. These heuristic algorithms are highly suitable to find the newlineoptimal location of the information to be hidden as the optimality is newlineenhanced in each generation until the exact location is found. By newlineconsidering the quantum of the work the following algorithms are newlinedeployed. The algorithms, Artificial Immune System (AIS), Genetic newlineviii newlineAlgorithm (GA), Particle Swarm Optimization (PSO), Ant Bee Colony newlineOptimization (ABC), and Ant Colony Optimization (ACO) are used for newlinelocating the information into the optimal point. Experimental results newlineshow that PSO and ABC are better algorithms for image steganography newlineas compared with other heuristic algorithms. PSO outperforms than the newlineother approa
dc.format.extentvi, 153
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleExploring the Optimized algorithms for enhancing the security And image quality in image steganography
dc.title.alternative
dc.creator.researcherSMITHA, G L
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.subject.keywordImaging Science and Photographic Technology
dc.description.note
dc.contributor.guideBaburaj, E
dc.publisher.placeChennai
dc.publisher.universitySathyabama Institute of Science and Technology
dc.publisher.institutionCOMPUTER SCIENCE DEPARTMENT
dc.date.registered2011
dc.date.completed2020
dc.date.awarded2023
dc.format.dimensionsA5
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:COMPUTER SCIENCE DEPARTMENT

Files in This Item:
File Description SizeFormat 
10.annexure.pdfAttached File1.18 MBAdobe PDFView/Open
1.title.pdf50.64 kBAdobe PDFView/Open
2.prelim pages.pdf2.24 MBAdobe PDFView/Open
3.abstract.pdf170.12 kBAdobe PDFView/Open
4.contents.pdf337.09 kBAdobe PDFView/Open
5.chapter 1.pdf885.33 kBAdobe PDFView/Open
6.chapter 2.pdf794.7 kBAdobe PDFView/Open
7.chapter 3.pdf943.63 kBAdobe PDFView/Open
80_recommendation.pdf50.64 kBAdobe PDFView/Open
8.chapter 4.pdf711.74 kBAdobe PDFView/Open
9.chapter 5.pdf174.07 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: