A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Electronics & Communication Engineering | India | Volume 6 Issue 6, June 2017

A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform

Y. S. Thakur, Brij Mohan Kumar

Steganography is the study of embedding and hiding messages in a medium called a cover text. Steganography is related to cryptography . It was used by the Ancient Greeks to hide information about troop movements by tattooing the information on someone's head and then letting the person grow out their hair. Simply put, steganography is as old as dirt. The simple fact is that an encrypted message does not resemble anything else but an encrypted message. Once a third party determines that you are communicating in secret, they may feel compelled to force you or the person you are communicating with to tell them what you are hiding. The basic idea behind cryptography is that you can keep a message a secret by encoding it so that no one can read it. If a good cryptographic cipher is used, it is likely that no one, not even a government entity, will be able to read it.

Keywords: Authentication, security, secret messaging

Edition: Volume 6 Issue 6, June 2017

Pages: 2517 - 2521

Share this Article

How to Cite this Article?

Y. S. Thakur, Brij Mohan Kumar, "A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174693, Volume 6 Issue 6, June 2017, 2517 - 2521

105 PDF Views | 88 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi, Dr. Veena Desai

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2744 - 2748

Hand Geometry as a Biometric for Human Identification

Rahul C. Bakshe, Dr. A. M. Patil

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 638 - 641

Multimodal Biometric Security System with Stegnographic Technique

Prerana Kamble, Sangita Nikumbh

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1979 - 1983

An Energy Efficient Secure Acknowledgement based Authentication Protocol for WSN

Suman K. Sharma, K. T. Jadhao

Share this Article

Similar Articles with Keyword 'security'

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2018 - 2021

Design and Implementation of Ballot Malfunctioning System Avoidance Security Optimization

A. Lalitha, N. Muthu Sankar

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1102 - 1107

Analysis of Stream Ciphers Based on Theoretic Approach

Shisif Pokhrel, Ahmed Abdul Kadhim Basheer

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1536 - 1538

An Electronic Improvisation Embedded Technology in Automobiles for Run-of-Roads

Chilumula Sudheer Kumar, Ch. Kalyani

Share this Article
Top