Open Access   Article Go Back

Steganography Using Reversible Texture Synthesis

J. SenthilMurugan1 , G. Hariharan2 , R. Kirubagaran3

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-2 , Page no. 156-158, Feb-2016

Online published on Feb 29, 2016

Copyright © J. SenthilMurugan, G. Hariharan , R. Kirubagaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. SenthilMurugan, G. Hariharan , R. Kirubagaran, “Steganography Using Reversible Texture Synthesis,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.156-158, 2016.

MLA Style Citation: J. SenthilMurugan, G. Hariharan , R. Kirubagaran "Steganography Using Reversible Texture Synthesis." International Journal of Computer Sciences and Engineering 4.2 (2016): 156-158.

APA Style Citation: J. SenthilMurugan, G. Hariharan , R. Kirubagaran, (2016). Steganography Using Reversible Texture Synthesis. International Journal of Computer Sciences and Engineering, 4(2), 156-158.

BibTex Style Citation:
@article{SenthilMurugan_2016,
author = {J. SenthilMurugan, G. Hariharan , R. Kirubagaran},
title = {Steganography Using Reversible Texture Synthesis},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2016},
volume = {4},
Issue = {2},
month = {2},
year = {2016},
issn = {2347-2693},
pages = {156-158},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=816},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=816
TI - Steganography Using Reversible Texture Synthesis
T2 - International Journal of Computer Sciences and Engineering
AU - J. SenthilMurugan, G. Hariharan , R. Kirubagaran
PY - 2016
DA - 2016/02/29
PB - IJCSE, Indore, INDIA
SP - 156-158
IS - 2
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1582 1736 downloads 1553 downloads
  
  
           

Abstract

We suggest a new way as steganography applying a convertible framework combination. A convertible framework method examine a shorter convertible figure, whichever combine a current convertible figure along a same limited presentation also an approximate area. We unite the framework combination method into steganography to hide unseen information. In opposition to applying an extant mask figure to conceal information, our invention hide the authority framework figure also merge the hidden information completed the procedure of convertible framework. This permits us to passage the convertible information and authority framework againsta steganography authority framework. Our ways suggest three explicit benefits. First, our method suggests the merging sufficiency that is equivalent to the region of the steganography framework figure. Second, a steganalytic invention is not probable to beat our steganographic method. Third, the convertible facility ingrained against our scenario gives performance, whichever admit improving of the authority framework. Exploratory creature have confirmed that our advanced invention can give different characters of merging accommodation, give a optically reasonable framework figure, also reclaim theconnected combination.

Key-Words / Index Term

Information Merging, Instance-Located Suggestion, Convertible, Steganography, Framework, Combination

References

[1] N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” Computer, vol. 31, no. 2, pp. 26–34, 1998.
[2] N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy, vol. 1, no. 3, pp. 32–44, May/Jun. 2003.
[3] A. A. Efros and W. T. Freeman, “Image quilting for texture synthesis and transfer,” in Proc. 28th Annu. Conf. Comput. Graph. Interact. Techn., 2001, pp. 341–346.
[4] K. Xu et al., “Feature-aligned shape texturing,” ACM Trans. Graph., vol. 28, no. 5, 2009, Art. ID 108.
[5] H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc.8th Int. Symp. Smart Graph, Kyoto, Japan, 2007, pp. 146–157.
[6] H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,”IEEEComput.Graph. Appl., vol. 29, no. 6, pp. 74–81, Nov. /Dec. 2009.