Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

Extended Fibonacci Series for Selection of Master Pixels Components in Data Hiding
Virendra P Nikam, Sheetal S Dhande
Sipna College of Engineering and Technology Amravati 444606. India
Abstract: Now a day an information security is a major issue in an IT Sector. An information security becomes complex and more important problem. Much of an organization does their expenditure on securing their data. Achieving security of the local server is not a big issue, but the problem comes When sensitive information transmitted over a wireless network. Encryption/ decryption can be an important tool to help in improving information security. This paper focus on a concept of data hiding process through the use of fabbonacci series that get helps in randomize pixel selection. Randomize approach for pixel selection helps to achieve a good match between original carrier and resultant carrier. we developed techniques for securing data to avoid hacking as well as providing the user with some additional features such as key for integrity and validation of user. In this technique one can secure any type of files by hiding it in carrier media using Fibonacci series. The proposed algorithm is loss-less, key-dependent.
Keywords: Data Hiding, Fibonacci Series, Master Pixels, Carrier Channels, Wireless Media Extended Fibonacci Series for Selection of Master Pixels Components in Data Hiding
DOI:https://doi.org/10.6025/jisr/2020/11/1/1-9
Full_Text   PDF 894 KB   Download:   360  times
References:

[1] Ni, Z., Shi, Y. -Q., Ansari, N., Su, W. (2006). Reversible Data Hid-ing, IEEE Transactions on Circuits and Systems for Video Technology, 16 (3) 354-362.
[2] Tai, W. -L., Yeh, C. -M., Chang, C. -C. (2009). Reversible data hiding based on histogram modification of pixel differences, IEEE Transactions on Circuits and Systems for Video Technology, 19 (6) 906–910.
[3] Zhang, X. (2011). Reversible data hiding in encrypted images, IEEE Signal Processing Letters, 18 (4) 255–258.
[4] Hong, W., Chen, T., Wu, H. (2012). An improved reversible data hiding in encrypted images using side match, IEEE Signal Processing Letters, 19 (4) 199–202, 2012.
[5] Liao, X., Shu, C. (2015). Reversible data hiding in encrypted im-ages based on absolute mean difference of multiple neighboring pixels, Journal of Visual Communication and Image Representation, 28, 21–27.
[6] Qian, Z., Dai, S., Jiang, F., Zhang, X. (2016). Improved joint re-versible data hiding in encrypted images, Journal of Visual Communication and Image Representation, 40, p 732-738.
[7] Zhou, J., Sun, W., Dong, L., et al. (2016). Secure reversible image data hiding over encrypted domain via key modulation, IEEE Transactions on Circuits and Systems for Video Technology, 26 (3) 441- 452.
[8] Zhang, X. (2012). Separable reversible data hiding in encrypted image, IEEE Transactions on Information Forensics Security, 7 (2) 826–832.
[9] Wu, X., Sun, W. (2014). High-capacity reversible data hiding in encrypted images by prediction error, Signal Processing, 104, 387-400.
[10] Qian, Z., Zhang, X. (2016). Reversible data hiding in encrypted image with distributed source encoding, IEEE Transactions on Circuits and Systems for Video Technology, 26 (4) 636-646.
[11] Qian, Z., Zhang, X., Feng, G. (2016). Reversible data hiding in encrypted images based on progressive recovery, IEEE Signal Processing Letters, 23 (11) 1672-1676.
[12] Huang, F., Huang, J., Shi, Y. Q. (2016). New framework for re-versible data hiding in encrypted domain. IEEE Transactions on Information Forensics and Security, 11 (12) 2777-2789.
[13] Ma, K., Zhang, W., Zhao, X. (2013). Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transactions on Information Forensics Security, 8 (3) 553-562.
[14] Zhang, W., Ma, K., Yu, N. (2014). Reversibility improved data hiding in encrypted images, Signal Processing, 94, 118–127, 2014.
[15] Cao, X., Du, L., Wei, X. (2016). High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Transactions on Cybernetics, 46 (5) 1132-1143.
[16] Harshvardhan et al. A Survey on Various Data Hiding Techniques and their Comparative Analysis, p.1-9
[17] Naseem, M., Ibrahim M. Hussain., Kamran Khan, M., Aisha Ajmal. (2011). An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding, International Journal of Computer Applications, 29 (12), 2011. Foundation of Computer Science, New York, USA, p 36-38.
[18] Nosrati, Masoud., Karimi,Ronak., Hariri, Mehdi. (2011). An introduction to steganography methods, World Applied Programming, 1 (3) August 2011. 191-195. WAP journal.
[19] Thampi, Sabu M (2004). Information Hiding Techniques: A Tutorial Review, ISTE-STTP on Network Security and Cryptography, LBSCE 2004, p 1-19.
[20] Bender, W., Gruh, D., Morimoto, N., Lu, A. (1996). Techniques for data Hiding, IBM SYSTEMS JOURNAL, 35 (3, 4) 1996, p 313-336.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info