ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Secure Image Stegnography Process

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 6)

Publication Date:

Authors : ; ;

Page : 1358-1360

Keywords : Steganography; Data hiding; envelop symbols; Information Security; Least Significant Bit and techniques;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Steganography is available to gain its significance due to the exponential growth and covert communication of possible computer users over the internet. It can also be distinct as the study of imperceptible communication that typically deals with the ways of hiding the survival of the communicate message. A usually data embed is achieved in message, image, text, voice or multimedia content for rights, military message, verification and many other purpose. In image Steganography, secret message is achieved to establish significance into cover image and generate a stego image, generated image which is carrying a hidden message. This paper has analyzed various steganographic techniques like DWT, NN, DCT, GA, Embedding algorithm with their advantages as well as disadvantages.

Last modified: 2021-06-30 21:49:27