International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

This paper presents a new frequency domain approach for steganography algorithm.The proposed system proved to be more robust than the existing systems and calculates its PSNR, MSE, CER and Correlation coefficient.This paper also analyse the Least Significant Bit (LSB) spatial domain based Steganography and Discrete Cosine Transform (DCT) frequency domain based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture.In DCT technique, message is hidden in more significant areas of cover image.An implementation of both these methods and DCT based proposed method with their performance analysis ( in terms of PSNR) has been done in this paper. Also different types of attacks such as salt and pepper noise has been applied.In these techniques, a trade-off between the amount of data to be hidden and the robustness of the image will be observed

Keywords: Least Significant Bit LSB, Discrete Cosine Transform DCT, PSNR, LSB

Edition: Volume 2 Issue 5, May 2013

Pages: 266 - 270


How to Cite this Article?

Ajit Singh, Swati Aggarwal, "Data Security through more robust DCT based methodology and Assessment in terms of PSNR", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201368, Volume 2 Issue 5, May 2013, 266 - 270

23 PDF Views | 14 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Discrete Cosine Transform DCT'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2188 - 2194

Blind Image / Video Quality Assessment Based on DCT-Domain Statistics

Minu Thomas, Saranya Sasidharan, Smitha K S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 194 - 197

Review of Transform Domain Techniques for Image Steganography

Sudhanshi Sharma, Umesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 134 - 138

JPEG Picture Compression Using Discrete Cosine Transform

Nitesh Kumar More, Sipi Dubey

Share this article

Similar Articles with Keyword 'PSNR'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1655 - 1659

Speckle Noise ReductionUsing Local Binary Pattern; Anisotropic Diffusion and Bilateral Filter

Mandeep Singh Sandhu, Rajandeep Kaur

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2606 - 2609

Designing and Comparative Analysis of Image Transmission using Techniques HQAM and QAM

Neeru Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 538 - 541

Simplified Filtering Technique to Edge Reconstruction and Comparison of Original Image in Low to High Density Noise Values

Dr. N. Naveen Kumar, K. Chandra Sekhar, K. Chokkanathan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this article

Similar Articles with Keyword 'LSB'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this article

Top