Secure Information Transmission Using Steganography and Morphological Associative Memory

Download Now
Provided by: International Journal of Computer Applications
Topic: Software
Format: PDF
In this paper, the authors presents a new steganography algorithm based on Morphology associative memory. Often, steganalysis methods are created to detect steganography algorithms using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In this paper, cover images are mapped to morphological representation by using morphology transform containing morphological coefficients, and each bit of secret message is inserted in the least significant bit of morphological coefficients. To evaluate stego quality, they measure the quality of the cover image after embedding by comparing with other image transformed steganography algorithms such as discrete cosine and Wavelet transforms.
Download Now

Find By Topic