A Secure Image Stegnography Process
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 6, June 2015

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Steganography is available to gain its significance due to the exponential growth and covert communication of possible computer users over the internet. It can also be distinct as the study of imperceptible communication that typically deals with the ways of hiding the survival of the communicate message. A usually data embed is achieved in message, image, text, voice or multimedia content for rights, military message, verification and many other purpose. In image Steganography, secret message is achieved to establish significance into cover image and generate a stego image, generated image which is carrying a hidden message. This paper has analyzed various steganographic techniques like DWT, NN, DCT, GA, Embedding algorithm with their advantages as well as disadvantages.

Keywords: Steganography, Data hiding, envelop symbols, Information Security, Least Significant Bit and techniques

Edition: Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

Share this Article

How to Cite this Article?

Sakshi, Jaspreet Kaur, "A Secure Image Stegnography Process", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=12061511, Volume 4 Issue 6, June 2015, 1358 - 1360

123 PDF Views | 89 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Research Paper, Information Technology, Myanmar, Volume 2 Issue 1, January 2013

Pages: 227 - 230

Message Embedding In PNG File Using LSB Steganographic Technique

Wai Wai Zin

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 6, June 2015

Pages: 627 - 631

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Share this Article

Similar Articles with Keyword 'Data hiding'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2137 - 2140

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2443 - 2447

Separable Reversible Data Hiding In Image Using a Keyless Approach

Jitbahan Samanta, G. Sujatha

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Research Paper, Information Technology, Myanmar, Volume 2 Issue 1, January 2013

Pages: 227 - 230

Message Embedding In PNG File Using LSB Steganographic Technique

Wai Wai Zin

Share this Article

Similar Articles with Keyword 'Information Security'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2358 - 2361

Information Security

Asif Husain

Share this Article
Top