Research Paper | Electronics & Communication Engineering | India | Volume 6 Issue 6, June 2017
A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform
Y. S. Thakur, Brij Mohan Kumar
Steganography is the study of embedding and hiding messages in a medium called a cover text. Steganography is related to cryptography . It was used by the Ancient Greeks to hide information about troop movements by tattooing the information on someone's head and then letting the person grow out their hair. Simply put, steganography is as old as dirt. The simple fact is that an encrypted message does not resemble anything else but an encrypted message. Once a third party determines that you are communicating in secret, they may feel compelled to force you or the person you are communicating with to tell them what you are hiding. The basic idea behind cryptography is that you can keep a message a secret by encoding it so that no one can read it. If a good cryptographic cipher is used, it is likely that no one, not even a government entity, will be able to read it.
Keywords: Authentication, security, secret messaging
Edition: Volume 6 Issue 6, June 2017
Pages: 2517 - 2521
How to Cite this Article?
Y. S. Thakur, Brij Mohan Kumar, "A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174693, Volume 6 Issue 6, June 2017, 2517 - 2521
40 PDF Views | 36 PDF Downloads
Similar Articles with Keyword 'Authentication'
Elliptical Curve Cryptography Based Hop-Hop Message Authentication
Anti-Theft Car Tracking and Controlling Security System based on Face Recognition
Shardool Patil, M. M. Sardeshmukh
Face Recognition Using the Concept of Principal Component Analysis
Tejaswini S, Vidyasagar K N
Data Protection Using Virtual Identity and Modified RSA
Rishin Ali K, Mohammed Aslam V.N
Combination of Fingerprints to Secure Privacy
A. N. Dalvi, D. G. Chougule
Similar Articles with Keyword 'security'
A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking
Jagtap. D. V, M. D. Patil
Face and Voice Assistant Based Smart Home Security and Home Automation System
Amrutha R, Geetha D. Devanagavi, Prabhat Kumar Panda
Analysis of Stream Ciphers Based on Theoretic Approach
Shisif Pokhrel, Ahmed Abdul Kadhim Basheer
Control and Monitoring of Home Appliances from a Remotely Located Cellular Phone
Routing Attacks in Wireless Ad Hoc Networks - A Survey
Joseena M Jose, Deepthi P M