Data Hiding Using Steganography: A Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Review Papers | Information Technology | India | Volume 3 Issue 11, November 2014

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Internet technologies are currently charring an important role in our day to day life. It has the benefit as well as disadvantages also.Which in term generates the wants of data activity technology for maintaining the secrecy of the key information. In this paper, we have a tendency to gift a completely unique high bit rate LSB Image data activity technique. The fundamental plan of the proposed LSB algorithmic program is knowledge embedding that causes token embedding distortion of the host image. Using the planned ballroom dance algorithmic program, knowledge activity bit are embedded into higher LSB layers, ensuing in increased strength against noise addition or image compression. Listening tests showed that the perceptual quality of knowledge hided image is higher within the case of the proposed technique than within the common place LSB technique.

Keywords: Higher LSB, Guard Pixels, Steganography, Multi- carrier, Information hiding, data Encryption

Edition: Volume 3 Issue 11, November 2014

Pages: 461 - 465

Share this Article

How to Cite this Article?

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte, "Data Hiding Using Steganography: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14821, Volume 3 Issue 11, November 2014, 461 - 465

63 PDF Views | 52 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Research Paper, Information Technology, Sri Lanka, Volume 2 Issue 7, July 2013

Pages: 181 - 186

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

V. Senthooran, L. Ranathunga, KokSheik Wong

Share this Article

Similar Articles with Keyword 'data Encryption'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2565 - 2567

Cloud Storage with Added Data Security and Integrity

Reshmi Das M V, R Charanya

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 9, September 2013

Pages: 334 - 339

Introducing an Encryption Algorithm based on IDEA

Osama Almasri, Hajar Mat Jani

Share this Article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1459 - 1462

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S

Share this Article
Top