International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 6, June 2015


A Secure Image Stegnography Process

Sakshi [60] | Jaspreet Kaur [15]


Abstract: Steganography is available to gain its significance due to the exponential growth and covert communication of possible computer users over the internet. It can also be distinct as the study of imperceptible communication that typically deals with the ways of hiding the survival of the communicate message. A usually data embed is achieved in message, image, text, voice or multimedia content for rights, military message, verification and many other purpose. In image Steganography, secret message is achieved to establish significance into cover image and generate a stego image, generated image which is carrying a hidden message. This paper has analyzed various steganographic techniques like DWT, NN, DCT, GA, Embedding algorithm with their advantages as well as disadvantages.


Keywords: Steganography, Data hiding, envelop symbols, Information Security, Least Significant Bit and techniques


Edition: Volume 4 Issue 6, June 2015,


Pages: 1358 - 1360


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sakshi, Jaspreet Kaur, "A Secure Image Stegnography Process", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 1358-1360, https://www.ijsr.net/get_abstract.php?paper_id=12061511

Similar Articles with Keyword 'Steganography'

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J. [2]

Share this Article

Downloads: 113

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive | Neelesh Gupta | Meha Khare

Share this Article
Top