Constructive Role of SFC & RGB Fusion versus Destructive Intrusion
نویسنده
چکیده
Digital Crime is the latest terrorist who can intrude into any domain by breaking any type of firewall or secret code without frittering even a single drop of blood. To fight this terror, a cryptic army was evolved but not good enough to succeed. As a consequence, an effective commando namely steganography has been evolved who can combat any type of destructive intrusion. In this paper, Space Filling Curve (SFC) and RBG colour compound stego action against the threat of digital crime has been proposed. The proposed stego system scans the colour image pixel by pixel along a complex path, not row by row, and hides the variable k bit of the secret data in each pixel visited in the order defined by a Space-Filling Curve (SFC) such as the Hilbert curve and the Moore curve traversing paths. Such curves visit each pixel in the color image which is split into Red, Green and Blue components. The effectiveness of the proposed stego system has been estimated by computing bit error rate (BER), Mean square error(MSE),Peak Signal to Noise Ratio (PSNR) and Mean Structural Similarity index(MSSIM). This paper also illustrates how security has been enhanced using this algorithm.
منابع مشابه
Constructive Role of SFC & RGB Fusion versus Destructive
Digital Crime is the latest terrorist who can intrude into any domain by breaking any type of firewall or secret code without frittering even a single drop of blood. To fight this terror, a cryptic army was evolved but not good enough to succeed. As a consequence, an effective commando namely steganography has been evolved who can combat any type of destructive intrusion. In this paper, Space F...
متن کاملCyber Disease Monitoring with Distributed Hash Tables: A Global Peer-to-Peer Intrusion Detection System
Traffic anomalies and distributed attacks are commonplace in today’s networks. Single point detection is often insufficient to determine the causes, patterns and prevalence of such events. Most existing distributed intrusion detection systems (DIDS) rely on centralized fusion, or distributed fusion with unscalable communication mechanisms. In this paper, we propose to build a distributed IDS ba...
متن کاملA knowledge-based system for the non-destructive diagnostics of façade isolation using the information fusion of visual and IR images
This paper describes a knowledge-based system for the non-destructive diagnostics of fac ade isolation. The system uses the fusion of information extracted from images obtained from two electromagnetic wavebands: from low-resolution IR images (320 240 pixels; 7.5–13 lm wavelength), and from highresolution visual RGB images (3264 2448 pixels; 0.39–0.75 lmwavelength). The fusion of the informatio...
متن کاملPhenomenology of love: The Destructive and Constructive Nature of Love
Love, this eminent humane experience, has been explored not only by writers and poets, but also by philosophers, psychologists and even experimental scientists. This paper aims to discuss a novel aspect in phenomenology of love, as the concept of destructive and constructive nature of love, which is to the best of our knowledge, presented for the first time. The fundamental idea of this paper w...
متن کاملAn Advanced Data Processing Based Fusion IDS Structures
An Intrusion can be definite as any perform or act that attempt to crack the veracity, privacy or accessibility of a source this may enclose of a on purpose not permitted challenge to admittance the information, influence the data, or create a system defective or not viable. With the growth of computer networks at an alarming rate through the past decade, safety has become one of the serious is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010