Sri Priya | Anna University (original) (raw)

Papers by Sri Priya

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video

Research paper thumbnail of Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents

IEEE Transactions on Information Forensics and Security, 2009

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW sch... more A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

Research paper thumbnail of Image encryption using different techniques: A review

… Journal of Emerging Technology and Advanced …, 2011

Research paper thumbnail of New framework for high secure data hidden in the MPEG using AES encryption algorithm

International Journal of Computer and …, 2009

Steganography is the art of information hiding and invisible communication. Unlike cryptography, ... more Steganography is the art of information hiding and invisible communication. Unlike cryptography, where the goal is to secure communications from the Snooper by make the data not understood. In this framework we will propose a collaborate approach between steganography and cryptography. This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method. As well, this paper will overview the use of data hiding techniques and its classification, furthermore we will assign the well-built of the AES algorithm, during this review the author will answer the question why they used AES algorithm. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec Which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden, encryption, extract, decryption functions without affecting the quality of the video