scispace - formally typeset
Search or ask a question
Author

Payal Jain

Bio: Payal Jain is an academic researcher. The author has contributed to research in topics: Wireless network & Steganography. The author has an hindex of 2, co-authored 3 publications receiving 127 citations.

Papers
More filters
Journal Article
TL;DR: Analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) basedSteganography is presented, an implementation of both methods and their performance analysis has been done.
Abstract: This paper presents analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. Converting an image from a format like GIF or BMP, which reconstructs the original message exactly (lossless compression) to a JPEG, which does not (lossy compression), and then back could destroy the information hidden in the LSBs. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.

131 citations

Journal Article
TL;DR: The working areas where the DTMF technique for controlling the domestic and industrial appliances is applicable and how it has advantages over RF are shown.
Abstract: Dual Tone Multi Frequency (DTMF) technique for controlling the domestic and industrial appliances is being presented in this paper. A simple mobile phone which works on DTMF tone, used to control the domestic as well as industrial electrical appliances which with the control system which we have designed here for experimental study. In recent state of affairs, domestic, military and industrial applications use this technique because it can be operated from remote location. Radio frequency (RF) is also used for wireless communication but DTMF is an alternate for RF. Mobile phone is used to send the DTMF code from remote location to the control system. The blocks of system are mobile phone,Microcontroller (AT89S52), DTMF Decoder (MT8870D), Relays and power supply. This paper shows the working areas where the system is applicable and how it has advantages over RF.

2 citations


Cited by
More filters
01 Jan 2013
TL;DR: A new technique of image steganography i.e. Hash-LSB with RSA algorithm is proposed for providing more security to data as well as the data hiding method.
Abstract: Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver. Security of confidential information has always been a major issue from the past times to the present time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver. Therefore from time to time researchers have developed many techniques to fulfill secure transfer of data and steganography is one of them. In this paper we have proposed a new technique of image steganography i.e. Hash-LSB with RSA algorithm for providing more security to data as well as our data hiding method. The proposed technique uses a hash function to generate a pattern for hiding data bits into LSB of RGB pixel values of the cover image. This technique makes sure that the message has been encrypted before hiding it into a cover image. If in any case the cipher text got revealed from the cover image, the intermediate person other than receiver can't access the message as it is in encrypted form.

84 citations

Journal ArticleDOI
TL;DR: The main objective in this paper is to provide resistance against visual and statistical attacks as well as high capacity data embedding approach by the combination of Steganography and cryptography.
Abstract: The network provides a method of communication to distribute information to the masses. With the growth of data communication over computer network, the security of information has become a major issue. Steganography and cryptography are two different data hiding techniques. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. We propose a high capacity data embedding approach by the combination of Steganography and cryptography. In the process a message is first encrypted using transposition cipher method and then the encrypted message is embedded inside an image using LSB insertion method. The combination of these two methods will enhance the security of the data embedded. This combinational methodology will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel. A comparative analysis is made to demonstrate the effectiveness of the proposed method by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). We analyzed the data hiding technique using the image performance parameters like Entropy, Mean and Standard Deviation. The stego images are tested by transmitting them and the embedded data are successfully extracted by the receiver. The main objective in this paper is to provide resistance against visual and statistical attacks as well as high capacity.

77 citations

Proceedings ArticleDOI
16 Oct 2014
TL;DR: This paper presents the detail knowledge about the LSB based image steganography and its applications to various file formats and analyzes the available image based Steganography along with cryptography technique to achieve security.
Abstract: Steganography refers to information or a file that has been concealed inside a digital picture, video or audio file. If a person views the object in which the information is hidden inside, he or she will have no indication that there is any hidden information. So the person will not try to decrypt the information. Steganography can be divided into Text Steganography, Image Steganography, Audio/Video Steganography. Image Steganography is one of the common methods used for hiding the information in the cover image. LSB is very efficient algorithm used to embed the information in a cover file. This paper presents the detail knowledge about the LSB based image steganography and its applications to various file formats. In this paper we also analyze the available image based steganography along with cryptography technique to achieve security.

69 citations

Journal ArticleDOI
TL;DR: Stego-texture is presented, a unique texture synthesis method that allows users to deliver personalized messages with beautiful, decorative textures and a new technique for automatically creating a background that is harmonious with the message based on a set of visual perception cues is proposed.
Abstract: We present stego-texture, a unique texture synthesis method that allows users to deliver personalized messages with beautiful, decorative textures. Our approach was inspired by the success of recent work generating marbling textures using mathematical functions. We were able to transform an input image or a text message into an intricate texture by combining the seven basic, reversible functions provided in the system. Later, the input image or message could be recovered by reversing the process of these functions. During the design process, the parameters of operations were automatically recorded, encrypted and invisibly embedded into the final pattern to create a stego-texture. In this way, the receiver could extract the hidden message from the stego-texture without the need for extra information from the sender. To ensure that the delivered message is unnoticeably covered by the texture, we propose a new technique for automatically creating a background that is harmonious with the message based on a set of visual perception cues.

52 citations

Journal Article
TL;DR: This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) basedSteganography and Discrete Wavelet Transform (dWT) based steganography.
Abstract: Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography.The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are embedded into the frequency components of the cover image.The performance and comparison of these three techniques is evaluated on the basis of the parameters MSE, PSNR, Capacity & Robustness.

50 citations