Data Security through more robust DCT based methodology and Assessment in terms of PSNR
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 121 | Monthly Hits: ⮙7

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

This paper presents a new frequency domain approach for steganography algorithm.The proposed system proved to be more robust than the existing systems and calculates its PSNR, MSE, CER and Correlation coefficient.This paper also analyse the Least Significant Bit (LSB) spatial domain based Steganography and Discrete Cosine Transform (DCT) frequency domain based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture.In DCT technique, message is hidden in more significant areas of cover image.An implementation of both these methods and DCT based proposed method with their performance analysis ( in terms of PSNR) has been done in this paper. Also different types of attacks such as salt and pepper noise has been applied.In these techniques, a trade-off between the amount of data to be hidden and the robustness of the image will be observed

Keywords: Least Significant Bit LSB, Discrete Cosine Transform DCT, PSNR, LSB

Edition: Volume 2 Issue 5, May 2013

Pages: 266 - 270

Share this Article

How to Cite this Article?

Ajit Singh, Swati Aggarwal, "Data Security through more robust DCT based methodology and Assessment in terms of PSNR", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201368, Volume 2 Issue 5, May 2013, 266 - 270

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Discrete Cosine Transform DCT'

Downloads: 110 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2188 - 2194

Blind Image / Video Quality Assessment Based on DCT-Domain Statistics

Minu Thomas, Saranya Sasidharan, Smitha K S

Share this Article

Downloads: 121 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

Share this Article

Downloads: 133 | Weekly Hits: ⮙1 | Monthly Hits: ⮙17

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 194 - 197

Review of Transform Domain Techniques for Image Steganography

Sudhanshi Sharma, Umesh Kumar

Share this Article

Downloads: 157 | Weekly Hits: ⮙1 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 134 - 138

JPEG Picture Compression Using Discrete Cosine Transform

Nitesh Kumar More, Sipi Dubey

Share this Article

Similar Articles with Keyword 'PSNR'

Downloads: 101 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Downloads: 101 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Downloads: 104 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Downloads: 106 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Similar Articles with Keyword 'LSB'

Downloads: 104 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 105 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article



Top