Steganographic Approach for Data Hiding using LSB Techniques
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 6)Publication Date: 2012-12-16
Authors : Baluram Nagaria Ashish Parikh Sandeep Mandliya Neeraj shrivastav;
Page : 441-445
Keywords : IP (Internet Protocol); IP datagram fragmentation; LAN (Local Area Network) Steganography;
Abstract
Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as JPEG compression, noise, rotation, translation etc Steganography has been implemented In MATLAB7.6 using basic image processing techniques. Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information But we have design a simulator in which we have transmit our data via mail or LAN. For securing the data, this will be password protected. For design this simulator we have encrypted our data and after that without password we will not decrypted the data. Our all conclusion is that we will secure our information. The difference between the two is in the appearance in the processed output; the output of Steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. In this paper, we have tried to elucidate the different approaches towards implementation of Steganography using ‘multimedia’ file (text, static image, audio and video) and Network IP datagram as cover.
Other Latest Articles
- Rough sets for Eliciting Symptoms for Landuse Class Conflict
- Energy Efficient Adaptive Routing Algorithm in MANET with Sleep Mode
- Privacy and Security issues in Cloud Computing
- Novel Approach to Knowledge Extraction Using Conceptual Association
- A Brief Overview of the Developments of the Cognitive Radio Technology
Last modified: 2013-01-26 21:32:28