Please use this identifier to cite or link to this item:
https://ir.vidyasagar.ac.in/jspui/handle/123456789/5745
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Jana, Biswapati | en_US |
dc.contributor.advisor | Giri, Debasis | en_US |
dc.contributor.author | Chowdhuri, Partha | - |
dc.date.accessioned | 2021-02-10T09:31:44Z | - |
dc.date.available | 2021-02-10T09:31:44Z | - |
dc.date.issued | 2021-02-08 | - |
dc.identifier.other | Thesis; | - |
dc.identifier.uri | http://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5745 | - |
dc.description.abstract | In today's Internet era, secure data communication is vital and indispensable. Image steganography is one of the most popular and widely used techniques to protect valuable information from illegitimate access. The quality of the stego image obtained from any steganographic scheme is inversely proportional to its data hiding capacity. This poses a challenge for the prospective researcher to balance a good trade-o among the quality of stego image, embedding capacity and robustness. Moreover, it is not only the extraction of the secret message from stego image but, the reconstruction of the original image from stego is also of paramount importance for many human centric applications such as tactical communication, health care, e-governance, commercial security, and intellectual property rights etc. In the last two decades, researchers around the globe have tried to resolve these problems to some extent but have not achieved a signi cant level of success. In order to overcome these issues, some new image steganographic schemes have been designed in spatial domain. These schemes maintain a good balance between stego image quality, embedding capacity and robustness. Two single image based steganographic schemes have been designed and implemented using graph neighbourhood, and pixel value difference. These schemes produce good quality stego image along with high embedding capacity. To increase the embedding capacity, robustness and to achieve reversibility, some dual image based steganographic schemes have been designed using graph neighbourhood and weighted matrix. In these schemes, the use of dual image and image interpolation techniques help to increase the data hiding capacity, improve visual quality and enhance the security. To strengthen the robustness under compressed environment, some novel steganographic schemes have been developed in transform domain using Discrete Cosine Transform and Discrete Wavelet Transform. To encounter the extent of distortion to the coefficient of transform domain, a weighted matrix is introduced to maintain good trade-o between quality and robustness. Further, some standard steganalysis techniques have been used to examine the proposed methods and tested under some steganographic attacks to analyze the robustness of the schemes because designing a new scheme is not enough, rather the analysis of its impact in terms of security and robustness is very much important that would determine whether it can be advocated globally or not. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Vidyasagar University, Midnapore, West Bengal, India, | en_US |
dc.subject | Data Hiding | en_US |
dc.subject | Weighted Matrix | en_US |
dc.subject | Steganography | en_US |
dc.subject | Spatial domain | en_US |
dc.title | Design and Analysis of Image Steganographic Protocol | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Computer Science - Ph.D |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | 19.1 kB | Adobe PDF | View/Open | |
02_certificate.pdf | 72.47 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 42.92 kB | Adobe PDF | View/Open | |
04_declaration.pdf | 48.29 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf | 62.34 kB | Adobe PDF | View/Open | |
06_contents.pdf | 43.51 kB | Adobe PDF | View/Open | |
07_list_of_tables.pdf | 65.75 kB | Adobe PDF | View/Open | |
08_list_of_figures.pdf | 65.5 kB | Adobe PDF | View/Open | |
09_abbreviations.pdf | 119.15 kB | Adobe PDF | View/Open | |
10_Chapter-1.pdf | 390.35 kB | Adobe PDF | View/Open | |
11_Chapter-2.pdf | 197.19 kB | Adobe PDF | View/Open | |
12_Chapter-3.pdf | 8.4 MB | Adobe PDF | View/Open | |
13_Chapter-4.pdf | 7.24 MB | Adobe PDF | View/Open | |
14_Chapter-5.pdf | 11.09 MB | Adobe PDF | View/Open | |
15_conclusions.pdf | 147.72 kB | Adobe PDF | View/Open | |
16_bibliography.pdf | 83.96 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.