Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
dwqd
    • by 
    • JPEG IMAGE STEGANOGRAPHY USING DWT
This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for... more
    • by 
    •   16  
      Image Processing and steganographyJPEG IMAGE STEGANOGRAPHY USING DWTAuthentication of Secret Information in Image Steganography AbstractDistributed Image Steganography (DIS)
Abstract — The project deals with detection of steganography content. Steganography is the process of hiding the secret information within an ordinary message, pictures, audio or videos. To reveal such content is more important to avoid... more
    • by 
    •   17  
      Information SystemsComputer ScienceInformation ScienceInformation Technology
    • by 
    • JPEG IMAGE STEGANOGRAPHY USING DWT
This paper presents the architecture and VHDL design of a Two Dimensional Discrete Cosine Transform (2D-DCT) with Quantization and zigzag arrangement. This architecture is used as the core and path in JPEG image compression hardware. The... more
    • by 
    •   28  
      Vlsi DesignFPGACommunication systemsDigital FPGA implementation
Since people use internet daily they have to take care about information security requirement more and more. In this wok a new algorithm for RGB based images steganography is presented. The algorithm uses LSB principle for hiding a... more
    • by 
    •   15  
      Computer ScienceComputer Security And ReliabilityComputer SecurityNetwork Steganography
Steganography is the technique of hiding the fact that communication is taking place, by hiding data in other data. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the... more
    • by  and +1
    •   13  
      Information SystemsComputer ScienceInformation TechnologyInformation Security
Image compression is considered as application performed for compression of data in digital format images. Digital images are comprised with large amount of information that requires bigger bandwidth. The techniques of image compression... more
    • by 
    •   7  
      Image compressionMatlab ProgrammingPSNRJPEG IMAGE STEGANOGRAPHY USING DWT
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the... more
    • by 
    •   10  
      Digital Signal ProcessingEmerging TechnologiesMultimedia Coding and TransmissionSignal and Image Processing
In modern era it is very challenging job that how to secure the data during transaction through internet. The redundancies of digital media as well as the characteristics of human visual system make hiding technology a significant one.... more
    • by  and +2
    •   30  
      Network SteganographySteganographyImage Processing and steganographyQuantum Steganography
information. By using various techniques, many people are trying to access information that they are should not have access to. With the development of science, the application of information security techniques and data that have been... more
    • by 
    •   26  
      Applied CryptographyEncryptionSteganographyStegnography and Encryption and Eye Tracking and Algorithms
Growth in technology has led to unprecedented demand for high speed architectures for complex signal processing applications. In 4G wireless communication systems, bandwidth is a precious commodity, and service providers are continuously... more
    • by 
    •   28  
      Henri BergsonOrthogonal Frequency Division Multiplexing (OFDM)Bertrand RussellMIMO-OFDM systems
With the growth of digital technology over the past decades, sending and storing electronic media has increased because the copying of data is possible without compromising quality and with very low cost. Thus, the use of digital works... more
    • by 
    •   10  
      Computer ScienceInformation SecurityComputer EngineeringNetwork Security
Myocardial Infarction (MI) or acute MI (AMI),is one of the leading causes of death worldwide. Precise and timely identification of MI and extent of muscle damage helps in early treatment and reduction in the time taken for further tests.... more
    • by 
    •   16  
      Hospitality ManagementClustering and Classification MethodsCancerOral Plaque Biofilms
-- Image steganography is the art of hiding a message, image, or file within another message, image, or file. Likely, an old term in Ancient Greek, Steganography is derived from steganos meaning ―”concealed” and graphein meaning... more
    • by 
    •   11  
      Image Processing and steganographyImage SteganographyJPEG IMAGE STEGANOGRAPHY USING DWTImage Processsing and Steganography
    • by 
    •   20  
      Henri BergsonBertrand RussellOFDMOFDMA
Diabetes Mellitus (DM), a chronic lifelong condition, is characterized by increased blood sugar levels. As there is no cure for DM, the major focus lies on controlling the disease. Therefore, DM diagnosis and treatment is of great... more
    • by 
    •   11  
      AlgorithmsDiabetesPattern RecognitionImage Features Extraction
    • by 
    •   6  
      Information SecurityCryptographySteganographyVideo Steganography
International Journal of Embedded Systems and Applications (IJESA) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Embedded Systems and applications. The goal of... more
    • by  and +2
    •   17  
      Genetic AlgorithmsLinux KernelImage and Video CompressionGenetic Algorithm
dwdadwa
    • by 
    • JPEG IMAGE STEGANOGRAPHY USING DWT
Steganography is a type of image information concealing technique which hides a secret message in a different media such as image, video and audio etc, called cover file. The main idea of steganography is to provide security to private or... more
    • by 
    •   13  
      SteganographyImage SteganographyJPEG IMAGE STEGANOGRAPHY USING DWTSteganography and Cryptography
Myocardial Infarction (MI) or acute MI (AMI) is one of the leading causes of death worldwide. Precise and timely identification of MI and extent of muscle damage helps in early treatment and reduction in the time taken for further tests.... more
    • by  and +1
    •   20  
      Hospitality ManagementClustering and Classification MethodsCancerOral Plaque Biofilms
Wireless sensor network (WSN) is composed of tiny sensors and they are powered by energy-constraint battery. The continual need to utilize limited bandwidth to absorb most of the packets has led to a great deal of research in the field of... more
    • by 
    •   5  
      Data CompressionAn Efficient Two Factor Frame Work for Wireless Sensor NetworksJPEG IMAGE STEGANOGRAPHY USING DWTtypes of security implemented in Embedded Systems.
Digital watermarking is a new method of protecting multimedia content from unauthorized copying. A digital multimedia technology has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance... more
    • by 
    •   7  
      WatermarkingDigital Data HidingSteganographyJPEG IMAGE STEGANOGRAPHY USING DWT
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the... more
    • by  and +2
    •   12  
      Image Features ExtractionSupport Vector MachinesHuman Eating BehavioursMultispectral & Hyperspectral Images Classification
Nowadays, Web Steganography is massively used for data hiding. The development of web has expanded the interest for strategies that can guarantee data security on site page. This paper utilizes the html labels (tags) to conceal the secret... more
    • by 
    •   20  
      Information SecurityNetwork SecurityInternational SecuritySecurity
ewwaqq
    • by 
    • JPEG IMAGE STEGANOGRAPHY USING DWT
We cannot operate the whole image directly in some applications like image recognition or image compression because it is inefficient method. Therefore, before recognition or compression, many image segmentation algorithms were suggested... more
    • by 
    •   6  
      Image and Video CompressionImage compression (Computer Science)Image compressionJPEG IMAGE STEGANOGRAPHY USING DWT
    • by 
    •   20  
      Henri BergsonBertrand RussellOFDMOFDMA
The Block Transform Coded, JPEG-a lossy image compression format has been used to keep storage and bandwidth requirements of digital image at practical levels. However, JPEG compression schemes may exhibit unwanted image artifacts to... more
    • by 
    •   2  
      Image ProcessingJPEG IMAGE STEGANOGRAPHY USING DWT
Area can be detected in cancer images by using MLE (Maximum Likelihood Estimation). Also this helps to find out the area of tumor affecting portions. DWT (Discrete Wavelet Transform) also used determine the values. '0' is denoted... more
    • by 
    •   20  
      Electrical EngineeringGrid ComputingSemiconductor DevicesMedicine
The important features of wavelet transform and different methods in compression of fingerprint images have been implemented. Image quality is measured objectively using peak signal to noise ratio (PSNR) and mean square error (MSE).A... more
    • by 
    •   20  
      Audio Signal ProcessingDigital Signal ProcessingImage and Video CompressionImage Analysis
    • by 
    •   19  
      Image ProcessingCancerDigital MammographyCancer Biology
The two mast cameras (Mastcam) onboard the Mars rover, Curiosity, are multispectral imagers with nine bands in each camera. Currently, the images are compressed losslessly using JPEG, which can achieve only two to three times compression.... more
    • by 
    •   13  
      Multispectral & Hyperspectral Images ClassificationJPEG IMAGE STEGANOGRAPHY USING DWTPerformance and Philosophy; Improvisation; Irony and SingularityPrincipal component analysis (PCA)
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission.... more
    • by 
    •   41  
      Computer ScienceComputer ArchitectureComputer GraphicsRobotics (Computer Science)
Area can be detected in cancer images by using MLE (Maximum Likelihood Estimation). Also this helps to find out the area of tumor affecting portions. DWT (Discrete Wavelet Transform) also used determine the values. '0' is denoted by black... more
    • by 
    •   13  
      Mean square errorDWTRoot-Mean Square ErrorMalignant Narcissism
— Today`s era is all about Big data. The stream of data which is continuously generated by Internet requires a huge storage capacity. In spite of the availability of various data center and content delivery networks, it also imposes... more
    • by  and +2
    •   6  
      DWTJPEG IMAGE STEGANOGRAPHY USING DWTLZW algorithmImage Compression Techniques
The Urban Surveillance Systems generate huge amount of video and image data and impose high pressure onto the recording disks. It is obvious that the research of video is a key point of big data research areas. Since videos are composed... more
    • by 
    •   3  
      Image ProcessingBig DataJPEG IMAGE STEGANOGRAPHY USING DWT