International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 122

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


General View on Techniques Used In Image Steganography

Jayshree V. Ingle | M. M. Bartere


Abstract: The Steganography is getting its importance due to the increase in secret communication of computer users over the internet. It can also be express as an invisible communication that actually deals with the ways of hiding the presence of the secrete message from the image. Generally that data embedding is achieved in the communication, text, image, multimedia, voice content for copyright, military communication, authentication and for many other purposes. In the image Steganography, secret communication is achieved to hide a message into the cover image. The secret message is embedded inside the cover image in encrypted format by using some hiding algorithm and it send to a receiver over a network. The receiver then it decrypted the message by applying the reverse process on the cover data and reveals the secret data. Steganography means is not to vary the structure of secret message, but hides it inside a carrier-object (cover object). After hiding process cover object and stego-object (object which contain secrete information) are similar. This paper is about to showthe two different techniques that is used in the image steganography. There are two techniques that we study in this paper are Wavelet Transform and spread spectrum.


Keywords: Cover image message, Stegno Image


Edition: Volume 4 Issue 5, May 2015,


Pages: 745 - 748


How to Cite this Article?

Jayshree V. Ingle, M. M. Bartere, "General View on Techniques Used In Image Steganography", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 745-748, https://www.ijsr.net/get_abstract.php?paper_id=SUB154196

How to Share this Article?






Similar Articles with Keyword 'Cover'

Downloads: 159 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri | S. K. Srivatsa [4]

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V

Share this Article


Top