International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Review Papers | Information Technology | India | Volume 3 Issue 11, November 2014

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Internet technologies are currently charring an important role in our day to day life. It has the benefit as well as disadvantages also.Which in term generates the wants of data activity technology for maintaining the secrecy of the key information. In this paper, we have a tendency to gift a completely unique high bit rate LSB Image data activity technique. The fundamental plan of the proposed LSB algorithmic program is knowledge embedding that causes token embedding distortion of the host image. Using the planned ballroom dance algorithmic program, knowledge activity bit are embedded into higher LSB layers, ensuing in increased strength against noise addition or image compression. Listening tests showed that the perceptual quality of knowledge hided image is higher within the case of the proposed technique than within the common place LSB technique.

Keywords: Higher LSB, Guard Pixels, Steganography, Multi- carrier, Information hiding, data Encryption

Edition: Volume 3 Issue 11, November 2014

Pages: 461 - 465


How to Cite this Article?

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte, "Data Hiding Using Steganography: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14821, Volume 3 Issue 11, November 2014, 461 - 465

21 PDF Views | 15 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this article

Research Paper, Information Technology, Myanmar, Volume 2 Issue 1, January 2013

Pages: 227 - 230

Message Embedding In PNG File Using LSB Steganographic Technique

Wai Wai Zin

Share this article

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this article

Similar Articles with Keyword 'data Encryption'

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1459 - 1462

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2565 - 2567

Cloud Storage with Added Data Security and Integrity

Reshmi Das M V, R Charanya

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 9, September 2013

Pages: 321 - 326

Proposing an Encryption Algorithm based on DES

Omar Zughoul, Hajar Mat Jani

Share this article

Top