Steganography Using Reversible Texture Synthesis
J. SenthilMurugan1 , G. Hariharan2 , R. Kirubagaran3
Section:Review Paper, Product Type: Journal Paper
Volume-4 ,
Issue-2 , Page no. 156-158, Feb-2016
Online published on Feb 29, 2016
Copyright © J. SenthilMurugan, G. Hariharan , R. Kirubagaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: J. SenthilMurugan, G. Hariharan , R. Kirubagaran, “Steganography Using Reversible Texture Synthesis,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.156-158, 2016.
MLA Style Citation: J. SenthilMurugan, G. Hariharan , R. Kirubagaran "Steganography Using Reversible Texture Synthesis." International Journal of Computer Sciences and Engineering 4.2 (2016): 156-158.
APA Style Citation: J. SenthilMurugan, G. Hariharan , R. Kirubagaran, (2016). Steganography Using Reversible Texture Synthesis. International Journal of Computer Sciences and Engineering, 4(2), 156-158.
BibTex Style Citation:
@article{SenthilMurugan_2016,
author = {J. SenthilMurugan, G. Hariharan , R. Kirubagaran},
title = {Steganography Using Reversible Texture Synthesis},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2016},
volume = {4},
Issue = {2},
month = {2},
year = {2016},
issn = {2347-2693},
pages = {156-158},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=816},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=816
TI - Steganography Using Reversible Texture Synthesis
T2 - International Journal of Computer Sciences and Engineering
AU - J. SenthilMurugan, G. Hariharan , R. Kirubagaran
PY - 2016
DA - 2016/02/29
PB - IJCSE, Indore, INDIA
SP - 156-158
IS - 2
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1582 | 1736 downloads | 1553 downloads |
Abstract
We suggest a new way as steganography applying a convertible framework combination. A convertible framework method examine a shorter convertible figure, whichever combine a current convertible figure along a same limited presentation also an approximate area. We unite the framework combination method into steganography to hide unseen information. In opposition to applying an extant mask figure to conceal information, our invention hide the authority framework figure also merge the hidden information completed the procedure of convertible framework. This permits us to passage the convertible information and authority framework againsta steganography authority framework. Our ways suggest three explicit benefits. First, our method suggests the merging sufficiency that is equivalent to the region of the steganography framework figure. Second, a steganalytic invention is not probable to beat our steganographic method. Third, the convertible facility ingrained against our scenario gives performance, whichever admit improving of the authority framework. Exploratory creature have confirmed that our advanced invention can give different characters of merging accommodation, give a optically reasonable framework figure, also reclaim theconnected combination.
Key-Words / Index Term
Information Merging, Instance-Located Suggestion, Convertible, Steganography, Framework, Combination
References
[1] N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” Computer, vol. 31, no. 2, pp. 26–34, 1998.
[2] N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy, vol. 1, no. 3, pp. 32–44, May/Jun. 2003.
[3] A. A. Efros and W. T. Freeman, “Image quilting for texture synthesis and transfer,” in Proc. 28th Annu. Conf. Comput. Graph. Interact. Techn., 2001, pp. 341–346.
[4] K. Xu et al., “Feature-aligned shape texturing,” ACM Trans. Graph., vol. 28, no. 5, 2009, Art. ID 108.
[5] H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc.8th Int. Symp. Smart Graph, Kyoto, Japan, 2007, pp. 146–157.
[6] H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,”IEEEComput.Graph. Appl., vol. 29, no. 6, pp. 74–81, Nov. /Dec. 2009.