Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
Everyone use computer networks to share resource and to exchange information. Protection of data is a demanding issue in todays era. The prevalent part of the data or information pass throughout the internet and it becomes difficult to make data secure. There arise a need of data hiding. Steganography is different as the study of hidden communication. Steganography is the skill and science of hiding a pinnacle secret communication in a cover media such as image, text, signals or sound in such a approach that nobody, with the exception of the intentional beneficiary knows the existence of the data. This paper express the thought to protect secret information in computer network by means of exploring initially what is the steganography, cryptography and DWT and the necessities associated to steganography. In this paper, we implemented the security and data hiding technique that are used to implement a steganography.
Keywords: steganography, computer security, Information hiding, image processing, communication
Edition: Volume 4 Issue 4, April 2015
Pages: 907 - 910
How to Cite this Article?
Prajakta B. Diwan, V. B. Bhagat, "A Steganography Approach to Protect Secret Information in Computer Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153054, Volume 4 Issue 4, April 2015, 907 - 910
131 PDF Views | 97 PDF Downloads
Similar Articles with Keyword 'steganography'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015
Pages: 1367 - 1372Comparative Study for Steganography Techniques
Zainalabideen Abdual Samad Rasheed
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1324 - 1327Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Similar Articles with Keyword 'computer security'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 873 - 877Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM
Shital Kuber, Prof. Digambar Padulkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1736 - 1740Malware Detection System using ID3 Algorithm for Android
Trupti D. Deshmukh, Vrunda K. Bhusari
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2184 - 2187Detection of Distributed Denial of Service Attack
Danveer Singh, Kalicharan Sahu
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2024 - 2027A Survey on Corrupted Video Recovery Using CODEC Specifications
Avinash Deshmukh, Manisha Desai
Similar Articles with Keyword 'Information hiding'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3119 - 3124Steganography & Cryptography for Regimented Data Hiding System: A Review
Akash Sharma, Nikita Jain
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1548 - 1550Joint Task Migration and Power Management in Wireless Computing
Dayanand G Savakar, Anand S Ghuli
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1551 - 1554Implementation of Encryption and Decryption Technique
Dayanand G Savakar, Anand S Ghuli
Review Papers, Computer Science & Engineering, Jordan, Volume 7 Issue 6, June 2018
Pages: 1713 - 1715Steganography and Watermarking: Review
Mohammed Salem Atoum
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
Similar Articles with Keyword 'image processing'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1673 - 1677Convolution Neural Network Based Image Recognition
Sofia Hamid, Mrigana Walia
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 202 - 204Detection & Selection of Skin and Skin like Background under Complex Background
Sangita Gudadhe, Priti Subramanium
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 749 - 750Improvised MATLAB Techniques and Applications in Image Processing
R. S. Aarthi
Similar Articles with Keyword 'communication'
Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016
Pages: 1523 - 1527Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1663 - 1668PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM
Muneeb Manzoor Bhat, Preeti Sondhi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy