Image Steganography Technique Using Sudoku Puzzle and Ecc Algorithm for Secured Data Transmission
نویسندگان
چکیده
Nowadays, Data transmission is becoming very important among humans. So there are many modes of data transmission introduced. Some of the modes of data transmission are through copper wires, wireless channels, computer buses, etc. Though there are certain modes of transmission, secured data transmission is an important thing what everyone needs, because everyone wants their data to transmit securely. But secured data transmission is still an important problem everyone is facing nowadays. So to overcome this problem, we have introduced a image Steganography technique using Sudoku puzzle and ECC algorithm for secured data transmission. Image Steganography refers to the process of hiding the data into image, while ECC algorithm helps to convert the original data into secret code. In the proposed method, the image Steganography is done using Sudoku puzzle. So, this method not only hides the data, but it also converts the original data into secret code. Thus, by combining these two techniques the data will be more securely transferred by the method. The proposed mechanism will be developed with the aid of the platform MATLAB.
منابع مشابه
An Image Steganography Scheme Using 3D-Sudoku
Steganography, an information-hiding technique, is that embedding secret information into a cover-media to generate a meaningful stego-media. This paper proposes a novel image steganography scheme using 3D-Sudoku. In this paper, a cyclically moving algorithm is used to construct a 3D-Sudoku. The data-embedding phase is that the pixels of the cover-image as the coordinate of 3D-Sudoku are modifi...
متن کاملImproving Image Data Hiding Capacity Scheme using Sudoku Puzzle in Color Images
-Steganography is a skill to convey the secret data in the digital images without getting any unexpected notices to attackers. LSB replacement, the simplest method, directly replaces the secret bits with LSB bit plane. Unfortunately, it is insecure because it cannot resist against the visual attacks and statistic detection. The original work was proposed by Chang et al. in 2010, and their work ...
متن کاملReal Time Implementation of Secured Multimedia Messaging Service System using Android
In this paper encryption and steganography algorithms are implemented using JAVATM with android platform to provide the security for real time multimedia messaging service system. Establishing hidden communication for mobile has become an important subject of security. One of the methods to provide security is steganography. Steganography is used to hide secret information inside some carrier. ...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملA Secured Lsb Image Steganography System Using Edge Detection, Lzw Compression and Hybrid Encryption Methods
Rapid growth of steganographic and cryptographic techniques has a great attention in digital era. Every one need privacy in this internet world. As number of users increases secret communication becomes more and more important. Transposal of data size and file quality through communication channel plays a major challenge for steganographic technique. Least significant bit is one of the simple a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014