International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 8, August 2017

New Steganography Technique

Shahbaa Mohammed

Recently there has been an increase in the use of the internet, people use it as a part of their daily lives. And to secure their data, steganography and cryptography are used. Here we suggest using a new steganography technique to hide multiple colored images in a single one by using Discrete Wavelet Transform (DWT). The cover image is represented by three color model which is H (Hue), S (Saturation) and I (Intensity), and the secret images are hidden in them. Multiple levels of the cover image are decomposed and the secret images are hidden in them and some of the similar frequencies components are merged. The hidden images are extracted from the stego image. By using this technique the changes done are less noticeable on the stego image compared to the original one with increased security.

Keywords: Stego image, Steganography, HIS, N-level DWT

Edition: Volume 6 Issue 8, August 2017

Pages: 1767 - 1769


How to Cite this Article?

Shahbaa Mohammed, "New Steganography Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176336, Volume 6 Issue 8, August 2017, 1767 - 1769

12 PDF Views | 14 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Stego image'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 8, August 2017

Pages: 1767 - 1769

New Steganography Technique

Shahbaa Mohammed

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1563 - 1568

More Secure Way of Sharing Secret Text Message

Amit Patel, Sai Prasad Kousika VNH

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1082 - 1085

Secure Image Transmission using Cipher Block Chaining Mode & Visual Steganography

Manoj Dhande, Arjun Mudaliyar, Vineeta Pandey, Pranali Dalvi

Share this article

Similar Articles with Keyword 'Steganography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article

Similar Articles with Keyword 'HIS'

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Top