Please use this identifier to cite or link to this item: https://idr.l2.nitk.ac.in/jspui/handle/123456789/8558
Full metadata record
DC FieldValueLanguage
dc.contributor.authorUdhayavene, S.
dc.contributor.authorDev, A.T.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2020-03-30T10:22:25Z-
dc.date.available2020-03-30T10:22:25Z-
dc.date.issued2015
dc.identifier.citationProcedia Computer Science, 2015, Vol.54, , pp.790-798en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8558-
dc.description.abstractThis paper introduces a new technique to increase the information security over the network using steganography in such a way that the secret message being sent is unidentifiable. There is a comparison made to give a clear view of how the algorithm proposed is better than LSB algorithm which is used since a long time for sending concealed messages. To avoid the chances of an attacker using steganalysis to retrieve the data, the data encryption is done. S-tool is used to show the reliability of this algorithm. We will be comparing both LSB and DKL algorithms on the basis of Mean Square Error, Peak Signal Noise Ratio, Relative Payload and Rate of Embedding. Here by its shown that DKL algorithm is more efficient than LSB algorithm. � 2015 The Authors.en_US
dc.titleNew Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)en_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.