Security Issues in Computer Networks and Stegnography

被引:0
|
作者
Saravanan, V. [1 ]
Neeraja, A. [2 ]
机构
[1] PSV Coll Engn & Technol, Dept Infonnat Technol, Krishnagiri, India
[2] PSV Coll Engn & Technol, Dept Comp Engn & Sci, Krishnagiri, India
关键词
Security; Capacity; Detectable Distortion; Macrobloc; Variation Range;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reduces the detectable distortion in a joint photographic experts group (JPEG) file during data hiding process, by introducing new region selection rule. The new region selection rule considers three factors, i.e., the horizontal difference (HD), vertical difference (VD) and region size (RS). The JPEG image will be split into number of blocks and each pixel in it will be examined to calculate the variations. Depends upon the variation, the amount of secret information will be hide in an image. This proposed method of information hiding will help to solve the security issues in computer networks. The experimental result scrys that, the proposed system hides approximately 45% of secret information in addition, comparing existing methods without increasing detectable distortion.
引用
收藏
页码:363 / 366
页数:4
相关论文
共 50 条
  • [41] COMPUTER-NETWORKS - PROBLEMS OF SECURITY
    LINDLEY, D
    NATURE, 1989, 340 (6231) : 252 - 252
  • [42] Research on Security Issues and Protection Strategy of Computer Network
    Zhu, Min
    Luo, Yong-jian
    Yang, Jun-qiang
    Xing, Ming-shun
    Zhao, Jing
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 284 - 287
  • [43] LEGAL AND SECURITY ISSUES POSED BY COMPUTER UTILITIES - REPLY
    KORN, DH
    HARVARD BUSINESS REVIEW, 1968, 46 (02) : 45 - 46
  • [44] Computer operating system logging and security issues: a survey
    Zeng, Lei
    Xiao, Yang
    Chen, Hui
    Sun, Bo
    Han, Wenlin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4804 - 4821
  • [45] Security Issues in Drinking Water Distribution Networks
    Eliades, Demetrios G.
    Polycarpou, Marios M.
    Charalambous, Bambos
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 500 - 508
  • [46] Network Architecture and Security Issues in Campus Networks
    Bin Ali, Mohammed Nadir
    Rahman, M. Lutfar
    Hossain, Syed Akhter
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [47] Security Issues In Mobile Ad Hoc Networks
    Sarika, S.
    Pravin, A.
    Vijayakumar, A.
    Selvamani, K.
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 329 - 335
  • [48] Privacy and Security Issues in Online Social Networks
    Ali, Shaukat
    Islam, Naveed
    Rauf, Azhar
    Din, Ikram Ud
    Guizani, Mohsen
    Rodrigues, Joel J. P. C.
    FUTURE INTERNET, 2018, 10 (12)
  • [49] Security Issues in Mobile Ad Hoc Networks
    Sandoval Orozco, A. L.
    Garcia Matesanz, J.
    Garcia Villalba, L. J.
    Marquez Diaz, J. D.
    Kim, T. -H.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [50] Security Issues in Controller Area Networks in Automobiles
    Buttigieg, Robert
    Farrugia, Mario
    Meli, Clyde
    2017 18TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA), 2017, : 93 - 98