Security Issues in Computer Networks and Stegnography

被引:0
|
作者
Saravanan, V. [1 ]
Neeraja, A. [2 ]
机构
[1] PSV Coll Engn & Technol, Dept Infonnat Technol, Krishnagiri, India
[2] PSV Coll Engn & Technol, Dept Comp Engn & Sci, Krishnagiri, India
关键词
Security; Capacity; Detectable Distortion; Macrobloc; Variation Range;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reduces the detectable distortion in a joint photographic experts group (JPEG) file during data hiding process, by introducing new region selection rule. The new region selection rule considers three factors, i.e., the horizontal difference (HD), vertical difference (VD) and region size (RS). The JPEG image will be split into number of blocks and each pixel in it will be examined to calculate the variations. Depends upon the variation, the amount of secret information will be hide in an image. This proposed method of information hiding will help to solve the security issues in computer networks. The experimental result scrys that, the proposed system hides approximately 45% of secret information in addition, comparing existing methods without increasing detectable distortion.
引用
收藏
页码:363 / 366
页数:4
相关论文
共 50 条
  • [21] Security and Trust Issues in BYOD Networks
    Safdar, Ghazanfar Ali
    Mansour, Ali
    IT PROFESSIONAL, 2023, 25 (04) : 45 - 51
  • [22] Security issues for wireless ATM networks
    Patiyoot, D
    Shepherd, SJ
    ICUPC '98 - IEEE 1998 INTERNATIONAL CONFERENCE ON UNIVERSAL PERSONAL COMMUNICATIONS, VOLS 1 AND 2, 1998, 1-2 : 1359 - 1363
  • [23] Security Issues in Wireless Networks: An Overview
    Barakovic, Sabina
    Kurtovic, Ena
    Bozanovic, Olja
    Mirojevic, Anes
    Ljevakovic, Selmir
    Husic, Jasmina Barakoviac
    2016 XI INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (BIHTEL), 2016,
  • [24] Security Issues in Named Data Networks
    Chatterjee, Tanusree
    Ruj, Sushmita
    Das Bit, Sipra
    COMPUTER, 2018, 51 (01) : 66 - 75
  • [25] An overview of security issues in wireless networks
    Vasiu, L
    Papamichail, N
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 493 - 497
  • [26] Security issues in wireless mesh networks
    Siddiqui, Muhammad Shoaib
    Hong, Choong Seon
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 717 - +
  • [27] Security issues in mobile data networks
    Nayak, D
    Rajendran, N
    Phatak, DB
    Gulati, VP
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3229 - 3233
  • [28] Security Issues in Wireless Sensor Networks
    Sora, Daniel
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2010, 6 (04) : 26 - 30
  • [29] Security and Vulnerability Issues in University Networks
    Al Maskari, Sanad
    Saini, Dinesh Kumar
    Raut, Swati Y.
    Hadimani, Lingraj A.
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL I, 2011, : 520 - 524
  • [30] Security issues in networks with Internet access
    Landwehr, CE
    Goldschlag, DM
    PROCEEDINGS OF THE IEEE, 1997, 85 (12) : 2034 - 2051