The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


The conveyance of sensitive information over any media involves secured approach. The most frequent method for this process is cryptography which is reliable to certain extent only. To strengthen the reliability of communication, steganography is one available solution. If message is conveyed over an image(like JPEG) as embedding space by adjusting the quantization table value, the reliability is further strengthened. Current article demonstrates this particular scheme involving few permutation algorithms which can be used for conveying sensitive information between sender and receiver. This dual compression on an image gives fair results.

Keywords

Image Processing, Steganography, Dual Compression, Quantization Tables.
User
Notifications
Font Size