Author : R.Jayapriya 1
Date of Publication :7th March 2016
Abstract: Recently, More Peoples they need to implement on TMS Processor using REAL TIME analysis to Data Secret Data hiding (DH) in encrypted images, since it maintains the excellent property that the original cover can be loss less recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional DH using LSB algorithm, and thus it is easy for the data hide to embed data in the encrypted image. The proposed method can achieve real process on TMS, data extraction and image recovery is free of without error. The secrete data which is classified as unknown is sent to the mobile of the owner as a MMS through the operating GSM modem. The owner upon receiving the information commands the system and the fuel is regulated using the relay in accordance with the command of the owner. This would be effective to authenticate the person under different environment and to have an efficient way of security.
Reference :
-
- S. Janakiraman, “Pixel Bit Manipulation for Encoded Hiding-An Inherentstego,”IEEE, vol. 978, pp. 1-4577, 2012.
- B. Schneier, “Applied Cryptography Protocols, Algorithm and Source Code in C,”2nd ed. Wiley India edition, 2007
- W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” Proc 13th Information Hiding(IH’2011),LNCS, vol. 6958, pp. 255–269, SpringerVerlag, 2011.
- A. Cheddad, J. Condell, K. Curran and P. Mc. Kevitt“Digital Image Steganography:Survey and Analysis of Current Methods,
- W. Zhang, B. Chen, and N. Yu, “Improving various reversible datahiding schemes via optimal codes for binary covers,” IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.
- Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans.Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
- P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009
- P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129–1143, 2009
- X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
- W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett.,vol. 19, no. 4, pp. 199– 202, Apr. 2012.
-
- A Wireless Tracking System for At-home Medical
- Equipment during Natural Disasters David Li, Student Member, IEEE Department of Science Commack High School 1 Scholar Lane, Commack, NY 11725 ,2015
- An Integrated Health Monitoring Syste Norhan S. Hammed R & D department BioBusiness Cairo, Egypt Mohamed I. Owis Systems and Biomedical Engineering Department Cairo University Egypt,2012
- Self-adaptive on-demand geographic routing for mobile ad hoc networks, X. Xiang, X. Wang, and Z. Zhou,2012
- Design of Vital Sign Monitor based on Wireless Sensor Networks and Telemedicine Technology Nair Siddharth Shivakumar [i] Department of Electronics and Communication Engineering, College of Engineering Guindy Campus, Anna University, Chennai, India,2010
- A Mobile Biomedical Device by Novel Antenna Technology for Cloud Computing Resource toward Pervasive Healthcare Ke-Ren Chena, Yu-Lun Linbc and Mu-Sheng Huangb The Department of Electronic Engineering Chung Chou Technology University, Yuanlin, Taiwan 510, R.O.C.a,2008
- The relationship between distance to hospital and patient mortality in emergencies: an observational J. Nicholl, J. West, S. Goodacre, and J. Tu[]rner, 2007