A Secure Image Stegnography Process
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 6)Publication Date: 2015-06-05
Authors : Sakshi; Jaspreet Kaur;
Page : 1358-1360
Keywords : Steganography; Data hiding; envelop symbols; Information Security; Least Significant Bit and techniques;
Abstract
Steganography is available to gain its significance due to the exponential growth and covert communication of possible computer users over the internet. It can also be distinct as the study of imperceptible communication that typically deals with the ways of hiding the survival of the communicate message. A usually data embed is achieved in message, image, text, voice or multimedia content for rights, military message, verification and many other purpose. In image Steganography, secret message is achieved to establish significance into cover image and generate a stego image, generated image which is carrying a hidden message. This paper has analyzed various steganographic techniques like DWT, NN, DCT, GA, Embedding algorithm with their advantages as well as disadvantages.
Other Latest Articles
- Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks
- One Class SVM Vs SVM Classification
- Big Data Quality: Early Detection of Errors in Process Flow using Alignments and Compliance Rules
- Implementation of Adaptive Video Compression using Hybridized Wavelet Transform
- Enhancement of Localization Algorithm in Wireless Sensor Networks
Last modified: 2021-06-30 21:49:27