Images Using Android
Abstract
Record is used to camouflage one media report inside another. Confirming a framework implies safeguarding the framework in general. In this strategy, picture coding is recommended that covers the information along a picked pixel and on the accompanying worth of the picked pixel, i.e., pixel+1. Experts now frequently encounter the issue of accessing private information on portable platforms. There are some limitations and drawbacks to this method. In order to overcome the disadvantage, a novel approach to managing the growing security of the framework is proposed. The stenography method will be utilized in this paper to conceal the text message within an image. Each essential datum, including passwords, is encoded and moved in an image, making it attempting to decipher. The most central and significant picture transcription procedure is the seventh Piece of a Pixel implanting strategy. In light of the picture's seventh piece, a numerical calculation is applied to the seventh piece of the pixels, bringing about the age of an impermanent variable (pixel + 1). The seventh piece of the chosen pixel and the seventh piece of the chosen pixel in addition to one are utilized for data covering and encryption in order to provide Android's verification framework with a higher level of security. The outcomes of this proposed picture transcription strategy stand out from other strategies currently in use and are both intriguing and promising.
References
Bhattacharyya, S., Sanyal, G., & Majumdar, A. (2009). An image based steganography model for promoting global cyber security. In Proceedings of International Conference on Systemics, Cybernetics and Informatics.
Sharma, M. H., MithleshArya, M., & Goyal, M. D. (2013). Secure image hiding algorithm using cryptography and steganography. IOSR Journal of Computer Engineering (IOSR-JCE) e- ISSN, 13(5), 1-6.
Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., & Mohd Daud, S. (2011). A survey on image steganography algorithms and evaluation. In Digital Information Processing and Communications: International Conference, ICDIPC 2011, Ostrava, Czech Republic, July 7-9, 2011, Proceedings, Part I (pp. 406-418). Springer Berlin Heidelberg.
Fridrich, J., & Goljan, M. (2002). Practical steganalysis of digital images: state of the art. security and Watermarking of Multimedia Contents IV, 4675, 1-13.
Bucerzan, D., Raţiu, C., & Manolescu,
M. J. (2013). SmartSteg: a new android based steganography application. International Journal of Computers, Communications and Control, 8(5), 681.
Thanikkal, J. G., Danish, M., & Sarwar, S. A. (2014). New Android Based Steganography Application for Smartphone‘s. Journal of Basic and Applied Engineering Research. Print ISSN, 2350-0077.
Savithri, G., & Sudha, K. L. (2014). Android application for secret image transmission and reception using chaotic steganography. International Journal of Innovative Research in Computer and Communication Engineering, 2(7), 5107-5113.
Refbacks
- There are currently no refbacks.