International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of Steganography enhances rather than replaces encryption. Messages are not secure simply by virtue of being hidden.

Keywords: Stego-object, Cover-object, Steganalysis, Cover Image, Embedding key, Extraction key, Steganography

Edition: Volume 4 Issue 1, January 2015

Pages: 2319 - 2323


How to Cite this Article?

Harjeet Kaur, Er Divya Goyal, "Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15833, Volume 4 Issue 1, January 2015, 2319 - 2323

22 PDF Views | 18 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Stego-object'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 745 - 748

General View on Techniques Used In Image Steganography

Jayshree V. Ingle, M. M. Bartere

Share this article



Similar Articles with Keyword 'Cover-object'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article



Similar Articles with Keyword 'Steganalysis'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1899 - 1903

Design of Application to Detect Images Embedded with Malicious Programs

Robert T. R. Shoniwa, Geogen George

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this article



Similar Articles with Keyword 'Cover Image'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 434 - 437

Increasing Data Hiding Capacity of Carrier Image Using BPCS Steganography

Vaishali, Abhishek Kajal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2321 - 2323

Integrated Data Hiding and Lossless Image Compression based on SMVQ and Image Inpainting

Sandeep Kumar, Nidhi Garg

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1266 - 1269

Visual Cryptography for Biometric Privacy

Shubhangi Rajanwar, Shirish Kumbar, Akshay Jadhav

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this article



Similar Articles with Keyword 'Embedding key'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1251 - 1253

Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream

Vaibhav Sonyabapu Barve, S. S. Bere

Share this article



Similar Articles with Keyword 'Steganography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1547 - 1549

Various Approaches of Video and Image Stenography: A Review

Mandeep Singh, Garima Mahajan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article
Top