A Steganography Approach to Protect Secret Information in Computer Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Everyone use computer networks to share resource and to exchange information. Protection of data is a demanding issue in todays era. The prevalent part of the data or information pass throughout the internet and it becomes difficult to make data secure. There arise a need of data hiding. Steganography is different as the study of hidden communication. Steganography is the skill and science of hiding a pinnacle secret communication in a cover media such as image, text, signals or sound in such a approach that nobody, with the exception of the intentional beneficiary knows the existence of the data. This paper express the thought to protect secret information in computer network by means of exploring initially what is the steganography, cryptography and DWT and the necessities associated to steganography. In this paper, we implemented the security and data hiding technique that are used to implement a steganography.

Keywords: steganography, computer security, Information hiding, image processing, communication

Edition: Volume 4 Issue 4, April 2015

Pages: 907 - 910

Share this Article

How to Cite this Article?

Prajakta B. Diwan, V. B. Bhagat, "A Steganography Approach to Protect Secret Information in Computer Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153054, Volume 4 Issue 4, April 2015, 907 - 910

131 PDF Views | 97 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'steganography'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Similar Articles with Keyword 'computer security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 873 - 877

Enhanced Training Phase Reduction with Feature Filtering for Malware Detection Using Ensemble SVM

Shital Kuber, Prof. Digambar Padulkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1736 - 1740

Malware Detection System using ID3 Algorithm for Android

Trupti D. Deshmukh, Vrunda K. Bhusari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2184 - 2187

Detection of Distributed Denial of Service Attack

Danveer Singh, Kalicharan Sahu

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2024 - 2027

A Survey on Corrupted Video Recovery Using CODEC Specifications

Avinash Deshmukh, Manisha Desai

Share this Article

Similar Articles with Keyword 'Information hiding'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3119 - 3124

Steganography & Cryptography for Regimented Data Hiding System: A Review

Akash Sharma, Nikita Jain

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1551 - 1554

Implementation of Encryption and Decryption Technique

Dayanand G Savakar, Anand S Ghuli

Share this Article

Review Papers, Computer Science & Engineering, Jordan, Volume 7 Issue 6, June 2018

Pages: 1713 - 1715

Steganography and Watermarking: Review

Mohammed Salem Atoum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

Similar Articles with Keyword 'image processing'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 202 - 204

Detection & Selection of Skin and Skin like Background under Complex Background

Sangita Gudadhe, Priti Subramanium

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 749 - 750

Improvised MATLAB Techniques and Applications in Image Processing

R. S. Aarthi

Share this Article

Similar Articles with Keyword 'communication'

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1663 - 1668

PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM

Muneeb Manzoor Bhat, Preeti Sondhi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article
Top