Deepak Kushwahah, P. Saurabh, R. Prasad, Pradeep Mewada
{"title":"基于离散Shearlet变换的文本信息和数字图像安全","authors":"Deepak Kushwahah, P. Saurabh, R. Prasad, Pradeep Mewada","doi":"10.1109/ICONC345789.2020.9117349","DOIUrl":null,"url":null,"abstract":"“Steganography” is a strategy that defeats unapproved clients to approach the critical information, to imperceptibility and payload limit utilizing the diverse system like discrete cosine transform (DCT) and discrete shearlet transform (DST). The available methods till date result in good robustness but they are not independent of file format. The point of this exploration work is to build up an autonomous of record organize and secure concealing information conspire. The independent of file format and secure hiding data scheme is increased by combining DST and least significant bits (LSB) technique. In like manner a proficient plan is produced here that are having better MSE and PSNR against various characters.","PeriodicalId":155813,"journal":{"name":"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Text Message and Digital Image Secure for Discrete Shearlet Transform\",\"authors\":\"Deepak Kushwahah, P. Saurabh, R. Prasad, Pradeep Mewada\",\"doi\":\"10.1109/ICONC345789.2020.9117349\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"“Steganography” is a strategy that defeats unapproved clients to approach the critical information, to imperceptibility and payload limit utilizing the diverse system like discrete cosine transform (DCT) and discrete shearlet transform (DST). The available methods till date result in good robustness but they are not independent of file format. The point of this exploration work is to build up an autonomous of record organize and secure concealing information conspire. The independent of file format and secure hiding data scheme is increased by combining DST and least significant bits (LSB) technique. In like manner a proficient plan is produced here that are having better MSE and PSNR against various characters.\",\"PeriodicalId\":155813,\"journal\":{\"name\":\"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICONC345789.2020.9117349\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONC345789.2020.9117349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Text Message and Digital Image Secure for Discrete Shearlet Transform
“Steganography” is a strategy that defeats unapproved clients to approach the critical information, to imperceptibility and payload limit utilizing the diverse system like discrete cosine transform (DCT) and discrete shearlet transform (DST). The available methods till date result in good robustness but they are not independent of file format. The point of this exploration work is to build up an autonomous of record organize and secure concealing information conspire. The independent of file format and secure hiding data scheme is increased by combining DST and least significant bits (LSB) technique. In like manner a proficient plan is produced here that are having better MSE and PSNR against various characters.