Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Implementation of Recursive method in Image Steganography
Blekinge Tekniska Högskola, Fakulteten för teknikvetenskaper, Institutionen för tillämpad signalbehandling.
Blekinge Tekniska Högskola, Fakulteten för teknikvetenskaper, Institutionen för tillämpad signalbehandling.
2015 (engelsk)Independent thesis Advanced level (degree of Master (Two Years))OppgaveAlternativ tittel
Genomförande av Rekursiv metod Bild Steganography (svensk)
Abstract [en]

Nowadays steganographic techniques are with us and in everywhere because we are using information more and more and we need to have or transform the information as secure as possible. In these techniques we need to secure the information by encrypting (coding) and decrypting (decoding). In this thesis we propose a different coding procedure based on recursive methodology. We used image as medium for this steganographic technique. An image is splitted (coded) and merged (decoded) by recursive procedure. Our experiments show that the technique is applicable for both Gray Scale and Color images and also no need of providing a key security facility at the decoder end.

Abstract [sv]

Making an information secure is the most difficult task as more number of hackers are available in the market. For that the proposed technique works more reliable since it has been developed using Recursive algorithm for Encrypting the image. Image has been encrypted in such a way that it had been splitted into pieces, so that it looked like noise for a naked eye. This method confuses the hacker even if a hacker can recognize it due to its encryption technique.The same inverse Recursive algorithm is used for decrypting the Encrypted image. The proposed technique worked relaibly when the encrypted has been passed through different decrypting techniques available in market.

sted, utgiver, år, opplag, sider
2015. , s. 37
Emneord [en]
Splitting, Encryption, Decryption, Recursive, Steganography
Emneord [sv]
Master of Science Programme in Electrical Engineering with emphasis on Signal Processing /Masterprogram i Elektroteknik med inriktning mot signalbehandling
HSV kategori
Identifikatorer
URN: urn:nbn:se:bth-2490Lokal ID: oai:bth.se:arkivexADFAA8A1DB13C6D2C1257E0F002EB7A0OAI: oai:DiVA.org:bth-2490DiVA, id: diva2:829769
Uppsök
Technology
Veileder
Merknad
+919885659419Tilgjengelig fra: 2015-04-22 Laget: 2015-03-21 Sist oppdatert: 2015-06-30bibliografisk kontrollert

Open Access i DiVA

fulltekst(1380 kB)1018 nedlastinger
Filinformasjon
Fil FULLTEXT01.pdfFilstørrelse 1380 kBChecksum SHA-512
4f0b40aba52357e8ac0304213cb0e41e0e31857f62eecdf64667e23314c55e1563a37f9f89f8c161fba565c7baf09d42f0e470738dac6daff3749fcb5f263cc4
Type fulltextMimetype application/pdf

Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 1019 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

urn-nbn

Altmetric

urn-nbn
Totalt: 636 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf