Loading

Data Hiding in Thermal Image using Levenberg Marquardt Technique
S. Vijay Ananth1, P. Sudhakar2, K. Sundari3, Nibi Maouriyan4, R. Raghavi5, S. Arivuselvan6

1S. Vijay Ananth, Research Scholar, PRIST University, Thanjavur (Tamil Nadu), India.
2P. Sudhakar, Department of Computer Science and Engineering, Annamalai University, Annamalai Nagar, (Tamil Nadu), India.
3K. Sundari, Department of Electronics and Communication Engineering, SRMIST, Kattangulathur (Tamil Nadu), India.
4Nibi Maouriyan, Department of Computer Science Engineering, Valliammai Engineering College Kanchipuram (Tamil Nadu), India.
5R. Raghavi, Department of Electronics and Communication Engineering, SRMIST, Kattangulathur, Chennai (Tamil Nadu), India.
6S. Arivuselvan, Department of Computer Science Engineering, Annamalai University, Annamalai Nagar, (Tamil Nadu), India.
Manuscript received on 04 June 2019 | Revised Manuscript received on 29 June 2019 | Manuscript Published on 04 July 2019 | PP: 421-424 | Volume-8 Issue-1S4 June 2019 | Retrieval Number: A10760681S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the ocean of technology, nothing stays secret for a long duration of time. Valuables always been hacked or stolen for it is increasing its value on its own and remains getting ones attraction at the peak. This creates an intention of knowing more about the hidden secrets with in it. Therefore, the security system plays a vital role in hiding the information from hackers or the unauthorised individuals or groups. Cryptography, deals with text of any language while Steganography, deals with the images. In this analysis the input secret data is transformed to a graphical and numerical representation, and embedded into a cover image and further fused with a thermal image before transmission. There ensuring a two level security by summing up the Cryptography and Steganography algorithms under one roof, and provides the best results on implementation.
Keywords: Data Thermal Image Technique Graphical.
Scope of the Article: Data Base Management System