A new methodology for data coding and embedding for high-capacity transmitting
by Rajesh Kumar Tiwari, G. Sahoo
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 3, No. 1, 2010

Abstract: The rapid development of internet opened up unlimited opportunities in the field of computing. However, it brought about a plethora of new issues and concerns, chief among them is the security of information that to be exchanged. Developing information hiding techniques have been seriously taken by many researchers, steganography, the science of embedding secret information into carrier image file is one of the main concern. In the current digital era, the steganographic methods may participate in the field of ultra wideband wireless communication, but the major hurdles is the pre-existing carrier with low embedding capacity. If we create the carrier file based on the transmitting message that will help us in two aspects, first it saves the bandwidth and second it maintains the utmost security as well. Unlike the other steganographic efforts, where data embedding in carrier file works in the principle of pre-existing carrier file, we propose here a method that works on the principle of creating its own carrier file based on the transmitting message. The major advantage of this approach is that there is never a mother carrier file created or exits in order to give a chance to other concerned to suspect the hiding of any secret file and at the same time, we utilise the minimum bandwidth with maximum security protection.

Online publication date: Wed, 31-Mar-2010

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com