IJRE – Volume 5 Issue 2 Paper 1

DOUBLE CODING MECHANISM FOR ROBUST DATA TRANSFER

Author’s Name :  N Ramya | D Rukmani | V Subhangini | Mrs S Yuvarani

Volume 05 Issue 02  Year 2018  ISSN No:  2349-252X  Page no: 1- 3

12

 

 

 

Abstract:

In this paper we are using two types of coding mechanism such as pseudo random code and Morse code. It is considered to be simple and lusty method since the above summarized techniques have been implemented in same audio data which is hided. Our proffered method provides satisfactory results for transmitting the message in a guaranteed way. In addition to the security, it is also a reliable process since the hidden message is embedded into a video file. The performance of this method is evaluated using MSE (Mean Square Error) and PSNR (Peak to Signal Noise Ratio). In our paper the audio and video installation is done with the help of compression technique and in the meanwhile it doesn’t affect the quality of the veiled audio.

Keywords:

Morse Code, Pseudo Random Code, Double Coding, Stegnography,Embedding, Extraction

References:

  1. J. J. Chae and B. S. Manjunath, “A Robust Embedded Data from Wavelet Coefficients,” University of California, Santa Barbara, CA 93106.
  2. Yun Q. Shi, “Reversible Data Hiding,” New Jersey Institute of Technology, Newark, NJ 07102, USA.
  3. Kamrul Hasan Talukder and Koichi Harada, “Haar Wavelet Based Approach for Image Compression and Quality Assessment of Compressed Image,”
  4. Musbah J. Aqel , Ziad A. Alqadi , Ibraheim M. El Emary, “Analysis of Stream Cipher Security Algorithm,” Journal of Information and Computing Science, ISSN 1746-7659, vol. 2, no. 4, 2007, pp. 288-298.
  5. S.Imaculate Rosaline, C. Rengarajaswamy, “A Steganographic Substitution technique using APPM for encrypted pixels”.
  6. Sapna Sasidharan and Deepu Sleeba Philip, “A Fast Partial image Encryption Scheme with Wavelet transform and RC4,” International Journal of Advances in Engineering & Technology,.©IJAET ISSN: 2231-1963.
  7. Manikandan R, Uma M, “ Reversible Data Hiding for Encrypted Image,” Journal of Computer Applications ISSN: 0974 – 1925,vol. 5, Issue EICA2012-1, February 10, 2012
  8. C. Rengarajaswamy, K. Vel Murugan, “Separable Extraction of Concealed Data and Compressed Image,”.
  9. P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009.
  10. L. Luo et al., “Reversible image water marking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.