Ms. Rukaiya A. Chaugule, Ms. Amrita A. Manjrekar

نویسنده

  • Amrita A. Manjrekar
چکیده

Since the rise of the Internet, security of information is one of the most important factors of information technology. This paper represents a new approach for data hiding by combining art image creation and tree based parity check method. First, a cubism-like art image which is an abstraction by prominent lines and regions is generated using source image. Then text message is embedded using tree-based parity check (TBPC) method into the cover art image created earlier. The TBPC method is a least significant bit steganographic method which is very efficient for hiding data in image due to its simplicity. Reducing distortion between the cover object and the stego object is an important issue for steganography. TBPC algorithm embeds data in cover image with minimal distortion yielding good quality stego images. This method provides a higher level of security to the valuable information.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Correlation between mutans streptococci counts of parents and their children residing in Chandigarh, India

OBJECTIVES To determine the prevalence of Mutans Streptococci (MS) in children and to evaluate the relationship between the salivary levels of MS in children and their parents. MATERIAL AND METHODS 100 children aged 3-6 years along with their parents (100 mothers and fathers each) were included in the study. The children were segregated depending upon their age and level of caries experience....

متن کامل

A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation

Over the past few years the attacks on Software systems is increasing at an astonishing rate resulting in high revenue losses. Hence, Cyber/Digital forensics plays an important role by providing methods to acquire, asses, interpret, and use digital evidence to fetch conclusive details of cyber crime behavior. Recent trend in cyber crimes is the use of Anti-Forensic attacks to thwart the process...

متن کامل

An efficient protocol for in vitro regeneration of Podophyllum hexandrum, a critically endangered medicinal plant

Rhizome explants were used to develop a protocol for in vitro plantlet regeneration of Podophyllum hexandrum, a critically endangered medicinal plant, through direct organogenesis. Highest rate of multiple shoot formation was noted in MS medium supplemented with 11.42 μM IAA within three months. A synergistic effect of 2.68 μM NAA and 11.1 μM BAP was second best. The 1⁄2 MS liquid medium with 1...

متن کامل

Feasibility of Identifying the Tobacco-related Global Metabolome in Blood by UPLC–QTOF-MS

Metabolomics is likely an ideal tool to assess tobacco smoke exposure and the impact of cigarette smoke on human exposure and health. To assess reproducibility and feasibility of this by UPLC-QTOF-MS, three experiments were designed for the assessment of smokers' blood. Experiment I was an analysis of 8 smokers with 8 replicates. Experiment II was an analysis of 62 pooled quality control (QC) s...

متن کامل

P36: The Interplay of Multiple Sclerosis and Menstrual Cycle: which one Affects the Other One?

Menstruation is suggested to affect multiple sclerosis (MS) symptoms, while the effect of MS on menstruation is not studied before. Here, we aimed to compare the pattern of menstrual cycle and its symptoms between MS patients and healthy controls. This is a cross-sectional study conducted during 2015–2016 in MS clinic of Kashani hospital, Isfahan, Iran. We included female patien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014