Downloads: 119
M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 6, June 2015
A Secure Image Stegnography Process
Sakshi [60] | Jaspreet Kaur [15]
Abstract: Steganography is available to gain its significance due to the exponential growth and covert communication of possible computer users over the internet. It can also be distinct as the study of imperceptible communication that typically deals with the ways of hiding the survival of the communicate message. A usually data embed is achieved in message, image, text, voice or multimedia content for rights, military message, verification and many other purpose. In image Steganography, secret message is achieved to establish significance into cover image and generate a stego image, generated image which is carrying a hidden message. This paper has analyzed various steganographic techniques like DWT, NN, DCT, GA, Embedding algorithm with their advantages as well as disadvantages.
Keywords: Steganography, Data hiding, envelop symbols, Information Security, Least Significant Bit and techniques
Edition: Volume 4 Issue 6, June 2015,
Pages: 1358 - 1360
Similar Articles with Keyword 'Steganography'
Downloads: 102
Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014
Pages: 528 - 535Document Security within Institutions Using Image Steganography Technique
Downloads: 113
Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014
Pages: 2750 - 2753Review on Different Methods of Image Steganography
Priyanka Dongardive | Neelesh Gupta | Meha Khare