Steganographic Method of Data Hiding using JPEG Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 103

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Steganography is an art of concealing the fact that communication is taking place, by hiding information in other information. Different formats can be used as medium, but digital images are the most popular in that, because of their frequency in the web. For hiding secret data in images there exist a large variety of steganographic methods, i. e. there exist complex method to simpler ones. Different applications may adopt different steganography techniques. Some applications may require complete invisibility of the secret information while some other may require a larger secret message to be hidden. This paper gives an overview of steganographic method in which we hide both text message and digital image in another digital image. To this end, the widely adopted framework for the development of the steganographic system is the minimal distortion embedding, in which a well-designed distortion function is the most important.

Keywords: JPEG steganography, uniform embedding, cover image, stego image, discrete cosine transform, quantization

Edition: Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Share this Article

How to Cite this Article?

Shabana Vathelil Subair, Fathima A Muhammadali, "Steganographic Method of Data Hiding using JPEG Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151370, Volume 4 Issue 11, November 2015, 1175 - 1178

Enter Your Email Address




Similar Articles with Keyword 'JPEG steganography'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 127

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 3, March 2018

Pages: 1887 - 1892

Proposed Adaptive Steganography

Raghad Khalid Mohammed, Woud Majid Abed

Share this Article

Similar Articles with Keyword 'cover image'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Downloads: 108 | Monthly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this Article

Downloads: 109 | Weekly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Similar Articles with Keyword 'stego image'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 8, August 2017

Pages: 1767 - 1769

New Steganography Technique

Shahbaa Mohammed

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1563 - 1568

More Secure Way of Sharing Secret Text Message

Amit Patel, Sai Prasad Kousika VNH

Share this Article

Similar Articles with Keyword 'discrete cosine transform'

Downloads: 82 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1984 - 1986

Discrete Cosine Transform based Image Inpainting

Bansi B. Thanki

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Similar Articles with Keyword 'quantization'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 109 | Weekly Hits: ⮙2 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 837 - 841

Fetal ECG Signal Optimization on Signal Obtained From FECG Sensor for Remote Areas with Lower Signal Strength for Its Smooth Propagation to Medical Databases

Sheena Chaudhary, Rupinder Kaur

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1232 - 1237

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

Nivi Varghese, Charlse M Varghese

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1536 - 1539

Research on Joint Watermarking & Lossless Compression for Image

Bharti Verma, Somesh Dewangan, Sachin Harne

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1373 - 1377

Symbolic Representation of Speech for Text Independent Speaker Recognition

Akshay S, Apoorva P

Share this Article



Top