Security Issues in Computer Networks and Stegnography

被引:0
|
作者
Saravanan, V. [1 ]
Neeraja, A. [2 ]
机构
[1] PSV Coll Engn & Technol, Dept Infonnat Technol, Krishnagiri, India
[2] PSV Coll Engn & Technol, Dept Comp Engn & Sci, Krishnagiri, India
关键词
Security; Capacity; Detectable Distortion; Macrobloc; Variation Range;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reduces the detectable distortion in a joint photographic experts group (JPEG) file during data hiding process, by introducing new region selection rule. The new region selection rule considers three factors, i.e., the horizontal difference (HD), vertical difference (VD) and region size (RS). The JPEG image will be split into number of blocks and each pixel in it will be examined to calculate the variations. Depends upon the variation, the amount of secret information will be hide in an image. This proposed method of information hiding will help to solve the security issues in computer networks. The experimental result scrys that, the proposed system hides approximately 45% of secret information in addition, comparing existing methods without increasing detectable distortion.
引用
收藏
页码:363 / 366
页数:4
相关论文
共 50 条
  • [31] DER Communication Networks and Their Security Issues
    Chan, Ki
    Kim, Yoohwan
    Jo, Ju-Yeon
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 785 - 790
  • [32] Security issues for wireless ATM networks
    Patiyoot, D
    Shepherd, SJ
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-3, 1998, : 1555 - 1559
  • [33] Application of Neural Networks in Computer Security
    Igor, Halenar
    Bohuslava, Juhasova
    Martin, Juhas
    Martin, Nesticky
    24TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION, 2013, 2014, 69 : 1209 - 1215
  • [34] A SECURITY METHODOLOGY FOR COMPUTER-NETWORKS
    PIERSON, LG
    WITZKE, EL
    AT&T TECHNICAL JOURNAL, 1988, 67 (03): : 28 - 36
  • [35] Entity Security architecture for computer networks
    Duan, H.-X., 2001, Science Press (24):
  • [36] Security in computer networks and distributed systems
    Prabhu, MM
    Raghavan, SV
    COMPUTER COMMUNICATIONS, 1996, 19 (05) : 379 - 388
  • [37] Security of broadcasting cryptosystem in computer networks
    Sun, HM
    ELECTRONICS LETTERS, 1999, 35 (24) : 2108 - 2109
  • [38] COMPUTER SECURITY - NETWORKS SPUR TO CRIME
    ANDERSON, C
    NATURE, 1990, 348 (6302) : 574 - 574
  • [39] Automatic Enforcement of Security in Computer Networks
    Mechri, T.
    Langar, M.
    Mejri, M.
    Fujita, H.
    Funyu, Y.
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2007, 161 : 200 - 222
  • [40] SECURITY ASPECTS OF THE PERSPECTIVE COMPUTER NETWORKS
    Kysela, Libor
    DISTANCE LEARNING, SIMULATION AND COMMUNICATION (DLSC 2011), 2011, : 163 - 167