Data Security through more robust DCT based methodology and Assessment in terms of PSNR
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

This paper presents a new frequency domain approach for steganography algorithm.The proposed system proved to be more robust than the existing systems and calculates its PSNR, MSE, CER and Correlation coefficient.This paper also analyse the Least Significant Bit (LSB) spatial domain based Steganography and Discrete Cosine Transform (DCT) frequency domain based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture.In DCT technique, message is hidden in more significant areas of cover image.An implementation of both these methods and DCT based proposed method with their performance analysis ( in terms of PSNR) has been done in this paper. Also different types of attacks such as salt and pepper noise has been applied.In these techniques, a trade-off between the amount of data to be hidden and the robustness of the image will be observed

Keywords: Least Significant Bit LSB, Discrete Cosine Transform DCT, PSNR, LSB

Edition: Volume 2 Issue 5, May 2013

Pages: 266 - 270

Share this Article

How to Cite this Article?

Ajit Singh, Swati Aggarwal, "Data Security through more robust DCT based methodology and Assessment in terms of PSNR", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201368, Volume 2 Issue 5, May 2013, 266 - 270

83 PDF Views | 70 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Discrete Cosine Transform DCT'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2188 - 2194

Blind Image / Video Quality Assessment Based on DCT-Domain Statistics

Minu Thomas, Saranya Sasidharan, Smitha K S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 194 - 197

Review of Transform Domain Techniques for Image Steganography

Sudhanshi Sharma, Umesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 134 - 138

JPEG Picture Compression Using Discrete Cosine Transform

Nitesh Kumar More, Sipi Dubey

Share this Article

Similar Articles with Keyword 'PSNR'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article

Similar Articles with Keyword 'LSB'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article
Top