IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Novel Dual Image-Based Reversible Hiding Technique Using LSB Matching-Digital World

A Novel Dual Image-Based Reversible Hiding Technique Using LSB Matching-Digital World
View Sample PDF
Author(s): Kalyanapu Srinivas (Kakatiya Institute of Technology and Science, India), K. Mounika (Kakatiya Institute of Technology and Science, India), Vyshnavi Kandukuri (Kakatiya Institute of Technology and Science, India), Harshini B. (Kakatiya Institute of Technology and Science, India), B. Sai Sreeja (Kakatiya Institute of Technology and Science, India)and Abhinay K. (Kakatiya Institute of Technology and Science, India)
Copyright: 2023
Pages: 11
Source title: New Approaches to Data Analytics and Internet of Things Through Digital Twin
Source Author(s)/Editor(s): P. Karthikeyan (National Chung Cheng University, Chiayi, Taiwan), Polinpapilinho F. Katina (University of South Carolina Upstate, USA)and S.P. Anandaraj (Presidency University, India)
DOI: 10.4018/978-1-6684-5722-1.ch007

Purchase

View A Novel Dual Image-Based Reversible Hiding Technique Using LSB Matching-Digital World on the publisher's website for pricing and purchasing information.

Abstract

The term internet has become more popular these days, and the whole world is connected virtually. Most people communicate through the internet. Communicating information from one to another in network without disclosing to third party is a typical task, but tracking of information is performed when certain security measures are not taken during transmission between the real-time environment and virtual environment. Creation of virtual representation for real-time process is known for the digital world. Secret data communication is performed under the digital world concept where there is a need of security. The chapter introduces a mechanism providing security using the ISDHR technique with least significant matching and dual images for secret message communication. The results show the proposed method is high enough in providing security to the secret data under transmission.

Related Content

N. Geethanjali, K. M. Ashifa, Avantika Raina, Jayashree Patil, Rameshwaran Byloppilly, S. Suman Rajest. © 2024. 19 pages.
Praveen Kakada, Muhammed Shafi M. K.. © 2024. 14 pages.
P. S. Venkateswaran, Divya Marupaka, Sachin Parate, Amit Bhanushali, Latha Thammareddi, P. Paramasivan. © 2024. 15 pages.
M. Lishmah Dominic, P. S. Venkateswaran, Latha Thamma Reddi, Sandeep Rangineni, R. Regin, S. Suman Rajest. © 2024. 15 pages.
S. Sivabala, P. Vidyasri. © 2024. 23 pages.
H. Hajra, G. Jayalakshmi. © 2024. 22 pages.
Anusha Thakur. © 2024. 15 pages.
Body Bottom