Views: 129 , Downloads: 110 | CTR: 85 % | Weekly Popularity: ⮙1
Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 8, August 2017
New Steganography Technique
Shahbaa Mohammed
Recently there has been an increase in the use of the internet, people use it as a part of their daily lives. And to secure their data, steganography and cryptography are used. Here we suggest using a new steganography technique to hide multiple colored images in a single one by using Discrete Wavelet Transform (DWT). The cover image is represented by three color model which is H (Hue), S (Saturation) and I (Intensity), and the secret images are hidden in them. Multiple levels of the cover image are decomposed and the secret images are hidden in them and some of the similar frequencies components are merged. The hidden images are extracted from the stego image. By using this technique the changes done are less noticeable on the stego image compared to the original one with increased security.
Keywords: Stego image, Steganography, HIS, N-level DWT
Edition: Volume 6 Issue 8, August 2017
Pages: 1767 - 1769
How to Cite this Article?
Shahbaa Mohammed, "New Steganography Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176336, Volume 6 Issue 8, August 2017, 1767 - 1769
129 PDF Views | 110 PDF Downloads
Similar Articles with Keyword 'Stego image'
Views: 136 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Views: 130 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1689 - 1691Authentication of Colored Document Image with Data Repair Capability
Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav
Views: 129 , Downloads: 110 | CTR: 85 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 8, August 2017
Pages: 1767 - 1769New Steganography Technique
Shahbaa Mohammed
Views: 133 , Downloads: 111 | CTR: 83 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1773 - 1778Image Steganography Scheme Using Neural Network in Wavelet Transform Domain
Anamika Sharma, Ajay Kushwaha
Views: 132 , Downloads: 114 | CTR: 86 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1563 - 1568More Secure Way of Sharing Secret Text Message
Amit Patel, Sai Prasad Kousika VNH
Similar Articles with Keyword 'Steganography'
Views: 136 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Views: 137 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Views: 121 , Downloads: 103 | CTR: 85 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2541 - 2544Reversible Data Embedding using F5 Algorithm
Sanjivani Koli, N. B. Pokale
Similar Articles with Keyword 'HIS'
Views: 289 , Downloads: 170 | CTR: 59 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016
Pages: 1523 - 1527Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Views: 194 , Downloads: 120 | CTR: 62 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Views: 1365 , Downloads: 439 | CTR: 32 % | Weekly Popularity: ⮙37
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Views: 153 , Downloads: 102 | CTR: 67 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Views: 205 , Downloads: 150 | CTR: 73 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran