Please use this identifier to cite or link to this item: http://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5745
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorJana, Biswapatien_US
dc.contributor.advisorGiri, Debasisen_US
dc.contributor.authorChowdhuri, Partha-
dc.date.accessioned2021-02-10T09:31:44Z-
dc.date.available2021-02-10T09:31:44Z-
dc.date.issued2021-02-08-
dc.identifier.otherThesis;-
dc.identifier.urihttp://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5745-
dc.description.abstractIn today's Internet era, secure data communication is vital and indispensable. Image steganography is one of the most popular and widely used techniques to protect valuable information from illegitimate access. The quality of the stego image obtained from any steganographic scheme is inversely proportional to its data hiding capacity. This poses a challenge for the prospective researcher to balance a good trade-o among the quality of stego image, embedding capacity and robustness. Moreover, it is not only the extraction of the secret message from stego image but, the reconstruction of the original image from stego is also of paramount importance for many human centric applications such as tactical communication, health care, e-governance, commercial security, and intellectual property rights etc. In the last two decades, researchers around the globe have tried to resolve these problems to some extent but have not achieved a signi cant level of success. In order to overcome these issues, some new image steganographic schemes have been designed in spatial domain. These schemes maintain a good balance between stego image quality, embedding capacity and robustness. Two single image based steganographic schemes have been designed and implemented using graph neighbourhood, and pixel value difference. These schemes produce good quality stego image along with high embedding capacity. To increase the embedding capacity, robustness and to achieve reversibility, some dual image based steganographic schemes have been designed using graph neighbourhood and weighted matrix. In these schemes, the use of dual image and image interpolation techniques help to increase the data hiding capacity, improve visual quality and enhance the security. To strengthen the robustness under compressed environment, some novel steganographic schemes have been developed in transform domain using Discrete Cosine Transform and Discrete Wavelet Transform. To encounter the extent of distortion to the coefficient of transform domain, a weighted matrix is introduced to maintain good trade-o between quality and robustness. Further, some standard steganalysis techniques have been used to examine the proposed methods and tested under some steganographic attacks to analyze the robustness of the schemes because designing a new scheme is not enough, rather the analysis of its impact in terms of security and robustness is very much important that would determine whether it can be advocated globally or not.en_US
dc.language.isoenen_US
dc.publisherVidyasagar University, Midnapore, West Bengal, India,en_US
dc.subjectData Hidingen_US
dc.subjectWeighted Matrixen_US
dc.subjectSteganographyen_US
dc.subjectSpatial domainen_US
dc.titleDesign and Analysis of Image Steganographic Protocolen_US
dc.typeThesisen_US
Appears in Collections:Computer Science - Ph.D

Files in This Item:
File Description SizeFormat 
01_title.pdf19.1 kBAdobe PDFView/Open
02_certificate.pdf72.47 kBAdobe PDFView/Open
03_abstract.pdf42.92 kBAdobe PDFView/Open
04_declaration.pdf48.29 kBAdobe PDFView/Open
05_acknowledgement.pdf62.34 kBAdobe PDFView/Open
06_contents.pdf43.51 kBAdobe PDFView/Open
07_list_of_tables.pdf65.75 kBAdobe PDFView/Open
08_list_of_figures.pdf65.5 kBAdobe PDFView/Open
09_abbreviations.pdf119.15 kBAdobe PDFView/Open
10_Chapter-1.pdf390.35 kBAdobe PDFView/Open
11_Chapter-2.pdf197.19 kBAdobe PDFView/Open
12_Chapter-3.pdf8.4 MBAdobe PDFView/Open
13_Chapter-4.pdf7.24 MBAdobe PDFView/Open
14_Chapter-5.pdf11.09 MBAdobe PDFView/Open
15_conclusions.pdf147.72 kBAdobe PDFView/Open
16_bibliography.pdf83.96 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.