Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kalpana, V.
- Image Steganography Using Ken Ken Puzzle for Secure Data Hiding
Abstract Views :243 |
PDF Views:0
Authors
Affiliations
1 SASTRA University, IN
1 SASTRA University, IN
Source
Indian Journal of Science and Technology, Vol 7, No 9 (2014), Pagination: 1403-1413Abstract
In image steganography, a number of data hiding schemes have been proposed and data has been hidden using them. Among these, the usage of mind-teasers and puzzles like Sudoku has also been used as schemes to hide data. In this paper, the territory of puzzle usage as data hiding scheme in image steganography is extended. A novel data hiding scheme based on Ken Ken puzzle is proposed. Though the Ken Ken puzzle is similar to the existing Sudoku technique of data hiding, the inherent difficulty involved in solving a Ken Ken puzzle is leveraged in this method and the final results after embedding data are then analyzed in terms of the visual quality of the stego-image obtained. This is done by means of certain quality metrics available to test the resulting image quality. The proposed system has been found to enhance the graphical quality of the resulting stego-image when compared to the existing system.Keywords
Data Hiding Scheme, Data Security, Image Steganography, Puzzle-based Steganography- Study on Data Storage Correctness Methods in Mobile Cloud Computing
Abstract Views :215 |
PDF Views:0
Authors
V. Kalpana
1,
V. Meena
1
Affiliations
1 Computer Science and Engineering, School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur – 613401, Tamilnadu, IN
1 Computer Science and Engineering, School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur – 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 6 (2015), Pagination: 495-500Abstract
Data Storage Correctness plays a major role in Mobile Cloud Computing. This deals with checking the integrity of data at remote cloud storage server. In auditing the data blindness should be incorporated regarding Third party auditing. Message Authentication Code, Digital Signatures, and Hash methods are employed for verification of message in the existing methods. In this current study data dynamic and public auditing is taken with confidentiality. This work isolates the method that is suitable for mobile cloud environment and gives the overall view of the auditing methods in the recent study. Design of an efficient auditing architecture to minimize computation and storage cost of the mobile devices are proposed to enhance the mobile users auditing is discussed. This work analysed on numerous existing cloud storage correctness methods pros and cons based on their technique, framework and also discusses the challenges that are required to implement data storage correctness method in Mobile Cloud Computing. This study gives a new framework to improve the integrity verification for remote data stored in cloud.Keywords
Auditing, Data Dynamics, Data Storage Correctness, Mobile Cloud, Provable Data Possession, Trusted Third Party.- A Novel Reversible Steganography Method using Dynamic Key Generation for Medical Images
Abstract Views :240 |
PDF Views:0
Authors
Nawlesh Kumar
1,
V. Kalpana
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 16 (2015), Pagination:Abstract
Nowadays security of information became an important issue. So it is mandatory to preserve the security of data that need to be transmitted in telemedicine application for proper and cost effective diagnosis. Steganography plays an important role in telemedicine application by providing confidentiality and integrity. This paper proposes a steganography technique which hides patient information inside medical images using a key dynamically generated by graph3 coloring and pixel count of cover image. Steganography is done along with cryptography by encrypting the patient information using RSA algorithm to strengthen the level of security. This proposed method maintains reversibility that the original medical images can be losslessly restored after the extraction of data from stego medical image. Experimental results show that this novel method is more secure as compared to other information hiding methods against various parameters such as computational complexity in key generation by unauthorized person and quality measure of reversed image in terms of Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE).Keywords
Chromatic Polynomial, Dynamic Key, Graph Coloring, Hash Value, Region of Interest, Reversible Steganography- Enhancing Embedding Capacity and Security using Reversible Texture Synthesis in Image Steganography
Abstract Views :147 |
PDF Views:0
Authors
S. Kruthika
1,
V. Kalpana
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN