A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Electronics & Communication Engineering | India | Volume 6 Issue 6, June 2017

A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform

Y. S. Thakur, Brij Mohan Kumar

Steganography is the study of embedding and hiding messages in a medium called a cover text. Steganography is related to cryptography . It was used by the Ancient Greeks to hide information about troop movements by tattooing the information on someone's head and then letting the person grow out their hair. Simply put, steganography is as old as dirt. The simple fact is that an encrypted message does not resemble anything else but an encrypted message. Once a third party determines that you are communicating in secret, they may feel compelled to force you or the person you are communicating with to tell them what you are hiding. The basic idea behind cryptography is that you can keep a message a secret by encoding it so that no one can read it. If a good cryptographic cipher is used, it is likely that no one, not even a government entity, will be able to read it.

Keywords: Authentication, security, secret messaging

Edition: Volume 6 Issue 6, June 2017

Pages: 2517 - 2521

Share this Article

How to Cite this Article?

Y. S. Thakur, Brij Mohan Kumar, "A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174693, Volume 6 Issue 6, June 2017, 2517 - 2521

40 PDF Views | 36 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2157 - 2160

Elliptical Curve Cryptography Based Hop-Hop Message Authentication

Devi Radhakrishnan

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1027 - 1031

Anti-Theft Car Tracking and Controlling Security System based on Face Recognition

Shardool Patil, M. M. Sardeshmukh

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3317 - 3320

Face Recognition Using the Concept of Principal Component Analysis

Tejaswini S, Vidyasagar K N

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2466 - 2469

Data Protection Using Virtual Identity and Modified RSA

Rishin Ali K, Mohammed Aslam V.N

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1822 - 1825

Combination of Fingerprints to Secure Privacy

A. N. Dalvi, D. G. Chougule

Share this Article

Similar Articles with Keyword 'security'

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 9 Issue 6, June 2020

Pages: 702 - 706

Face and Voice Assistant Based Smart Home Security and Home Automation System

Amrutha R, Geetha D. Devanagavi, Prabhat Kumar Panda

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1102 - 1107

Analysis of Stream Ciphers Based on Theoretic Approach

Shisif Pokhrel, Ahmed Abdul Kadhim Basheer

Share this Article

Case Studies, Electronics & Communication Engineering, India, Volume 3 Issue 5, May 2014

Pages: 512 - 515

Control and Monitoring of Home Appliances from a Remotely Located Cellular Phone

Aranya Sarkar

Share this Article

Survey Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3138 - 3140

Routing Attacks in Wireless Ad Hoc Networks - A Survey

Joseena M Jose, Deepthi P M

Share this Article
Top