Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/6422
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Helen Bethzia S | - |
dc.contributor.author | Ashok Kumar M | - |
dc.date.accessioned | 2024-02-27T05:57:16Z | - |
dc.date.available | 2024-02-27T05:57:16Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/6422 | - |
dc.description.abstract | Cryptography and Steganography are the two techniques used for secure transmission. Here, chaos encryption is used to encrypt the confidential text data onto unreadable forms. After data encryption, the data hider will conceal secret data Into the ElectroCard/oGram (ECG) signal using Adaptive Pixel Pair Matching (APPMJ. In the data extraction module, the secret data will be extracted from Steganographic ECG signal using shared secret key. To measure Steganography, ECG signal effectiveness Minimum Mean Square Error (MMSEJ and Root Mean Square Error (RMSEJ are used. Finally, the performance of encryption and data hiding will be analyzed based on ECG signal and data recovery. This technique of grand minimum distortion with high security protection and ECG data should be diagnosable after the data can be recovered. | - |
dc.publisher | I-manager's Journal on Digital Signal Processing | - |
dc.title | An Efficient Steganography Scheme Based on Chaos Encryption | - |
dc.vol | Vol. 2 | - |
dc.issued | No. 2 | - |
Appears in Collections: | Articles to be qced |
Files in This Item:
File | Size | Format | |
---|---|---|---|
AN EFFICIENT STEGANOGRAPHY SCHEME BASED ON.pdf Restricted Access | 1.59 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.