New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)

dc.contributor.authorUdhayavene, S.
dc.contributor.authorDev, A.T.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2026-02-06T06:39:42Z
dc.date.issued2015
dc.description.abstractThis paper introduces a new technique to increase the information security over the network using steganography in such a way that the secret message being sent is unidentifiable. There is a comparison made to give a clear view of how the algorithm proposed is better than LSB algorithm which is used since a long time for sending concealed messages. To avoid the chances of an attacker using steganalysis to retrieve the data, the data encryption is done. S-tool is used to show the reliability of this algorithm. We will be comparing both LSB and DKL algorithms on the basis of Mean Square Error, Peak Signal Noise Ratio, Relative Payload and Rate of Embedding. Here by its shown that DKL algorithm is more efficient than LSB algorithm. © 2015 The Authors.
dc.identifier.citationProcedia Computer Science, 2015, Vol.54, , p. 790-798
dc.identifier.issn18770509
dc.identifier.urihttps://doi.org/10.1016/j.procs.2015.06.093
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/32462
dc.publisherElsevier
dc.subjectDecryption
dc.subjectDKL
dc.subjectEncryption
dc.subjectLSB
dc.subjectSteganography
dc.titleNew Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)

Files