Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Implementation of Recursive method in Image Steganography
Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
2015 (English)Independent thesis Advanced level (degree of Master (Two Years))Student thesisAlternative title
Genomförande av Rekursiv metod Bild Steganography (Swedish)
Abstract [en]

Nowadays steganographic techniques are with us and in everywhere because we are using information more and more and we need to have or transform the information as secure as possible. In these techniques we need to secure the information by encrypting (coding) and decrypting (decoding). In this thesis we propose a different coding procedure based on recursive methodology. We used image as medium for this steganographic technique. An image is splitted (coded) and merged (decoded) by recursive procedure. Our experiments show that the technique is applicable for both Gray Scale and Color images and also no need of providing a key security facility at the decoder end.

Abstract [sv]

Making an information secure is the most difficult task as more number of hackers are available in the market. For that the proposed technique works more reliable since it has been developed using Recursive algorithm for Encrypting the image. Image has been encrypted in such a way that it had been splitted into pieces, so that it looked like noise for a naked eye. This method confuses the hacker even if a hacker can recognize it due to its encryption technique.The same inverse Recursive algorithm is used for decrypting the Encrypted image. The proposed technique worked relaibly when the encrypted has been passed through different decrypting techniques available in market.

Place, publisher, year, edition, pages
2015. , 37 p.
Keyword [en]
Splitting, Encryption, Decryption, Recursive, Steganography
Keyword [sv]
Master of Science Programme in Electrical Engineering with emphasis on Signal Processing /Masterprogram i Elektroteknik med inriktning mot signalbehandling
National Category
Signal Processing
Identifiers
URN: urn:nbn:se:bth-2490Local ID: oai:bth.se:arkivexADFAA8A1DB13C6D2C1257E0F002EB7A0OAI: oai:DiVA.org:bth-2490DiVA: diva2:829769
Uppsok
Technology
Supervisors
Note
+919885659419Available from: 2015-04-22 Created: 2015-03-21 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(1380 kB)232 downloads
File information
File name FULLTEXT01.pdfFile size 1380 kBChecksum SHA-512
4f0b40aba52357e8ac0304213cb0e41e0e31857f62eecdf64667e23314c55e1563a37f9f89f8c161fba565c7baf09d42f0e470738dac6daff3749fcb5f263cc4
Type fulltextMimetype application/pdf

By organisation
Department of Applied Signal Processing
Signal Processing

Search outside of DiVA

GoogleGoogle Scholar
Total: 232 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 347 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf