International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 129 | Views: 142

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015


Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur | Er Divya Goyal


Abstract: Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of Steganography enhances rather than replaces encryption. Messages are not secure simply by virtue of being hidden.


Keywords: Stego-object, Cover-object, Steganalysis, Cover Image, Embedding key, Extraction key, Steganography


Edition: Volume 4 Issue 1, January 2015,


Pages: 2319 - 2323


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

Harjeet Kaur, Er Divya Goyal, "Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 2319-2323, https://www.ijsr.net/get_abstract.php?paper_id=SUB15833



Similar Articles with Keyword 'Steganalysis'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar | Vijay Kumar Sharma [2]

Share this Article



Top