Stashing Scope Afore Encoding For Revocable Data Spanking In Encoded Images

Dasari Nagaraju, Alahari Hanumat Prasad

Abstract


Nowadays, information is rapidly available through the Internet. Companies have the ability to communicate with a worldwide audience through the World Wide Web. The extraction is performed in the reverse order as the embedding process. The side information (peak/zero points) should be additionally transmitted to the receiver for reversible recoveryThe original cover can be losslessly restored after the embedded information is extracted. In some applications, even any degradation of the original cover is not allowed, such as medical imagery, military imagery and law forensics.All early methods embed assemblage by reversibly vacating space from the encrypted reflections, which may be thing to both errors on data extraction and or appearance refurbishment. Data hacking is very challenging problem in today’s internet world. There are number of techniques to secure the data. So, the data hiding in the encrypted reflection comes into the picture, but occurrence of distortion at the time of data extraction is a main problem. In this article, Due to the modification on the pixel differences to hide secret data, the marked differences may be not in the normal range [0, 255] for a 8-bit grayscale image.

Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â