Abstract-The degree of imperceptibility of hidden image in the 'Digital Image Steganography' is mostly defined in relation to the limitation of Human Visual System (HVS), its chances of detection using statistical methods and its capacity to hide maximum information inside its body. Whereas, a tradeoff does exist between data hiding capacity of the cover image and robustness of underlying information hiding scheme. This paper is an exertion to underline the technique to embed information inside the cover at Stego key dependent locations, which are hard to detect, to achieve optimal security. Hence, it is secure under worst case scenario where Wendy is in possession of the original image (cover) agreed upon by Alice and Bob for their secret communication. Reliability of our proposed solution can be appreciated by observing the differences between cover, preprocessed cover and Stego object. Proposed scheme is equally good for color as well as gray scaled images. Another interesting aspect of this research is that it implicitly presents fusion of cover and information to be hidden in it while taking care of passive attacks on it.
Abstract-The ease with which data can be remitted across the globe via Internet has made it an obvious (as medium) choice for on line data transmission and communication. This salient trait, however, is constraint with akin issues of privacy, veracity of the information being exchanged over it, and legitimacy of its sender together with its availability when needed. Although cryptography is being used to confront confidentiality concern yet for many is slightly limited in scope because of discernibility of encrypted information. Further, due to restrictions imposed on the use of cryptography by its citizens for personal doings, various Governments have also coxswained the research arena to explore another discipline of information hiding called steganography -whose sole purpose is to make the information being exchanged inaudible. This research is focused on evolution of model based secure LSB Steganographic scheme for digital audio wave file format to withstand passive attack by Warden Wendy.
A hybrid algorithm called constant modulus least mean square (CMLMS) algorithm is proposed in order to address the potential problems existing with constant modulus algorithm (CMA) about its convergence. It is a two-stage adaptive filtering algorithm and based on least mean square (LMS) algorithm followed by CMA. A hybrid algorithm is theoretically developed and the same is verified through MatLab Software. Theoretical model is verified through simulation and its performance is evaluated in smart antenna in presence of a cochannel interfering signal and additive white Gaussian noise (AWGN) of zero mean. This is also tested in Rayleigh fading channel using digital modulation technique for Bit Error Rate (BER). Finally, a few computer simulations are presented in order to substantiate the theoretical findings with respect to proposed model. Corresponding results obtained with the use of only CMA and LMS algorithms are also presented for further comparison.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.