Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/8558
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Udhayavene, S. | |
dc.contributor.author | Dev, A.T. | |
dc.contributor.author | Chandrasekaran, K. | |
dc.date.accessioned | 2020-03-30T10:22:25Z | - |
dc.date.available | 2020-03-30T10:22:25Z | - |
dc.date.issued | 2015 | |
dc.identifier.citation | Procedia Computer Science, 2015, Vol.54, , pp.790-798 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8558 | - |
dc.description.abstract | This paper introduces a new technique to increase the information security over the network using steganography in such a way that the secret message being sent is unidentifiable. There is a comparison made to give a clear view of how the algorithm proposed is better than LSB algorithm which is used since a long time for sending concealed messages. To avoid the chances of an attacker using steganalysis to retrieve the data, the data encryption is done. S-tool is used to show the reliability of this algorithm. We will be comparing both LSB and DKL algorithms on the basis of Mean Square Error, Peak Signal Noise Ratio, Relative Payload and Rate of Embedding. Here by its shown that DKL algorithm is more efficient than LSB algorithm. � 2015 The Authors. | en_US |
dc.title | New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length) | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.