International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Research Paper | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016


A Steganography Implementation based on LSB and DCT

Sujit Patil | Shrikant Joshi


Abstract: In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat Steganography by detecting the hidden information and extracting. In this paper a comparative analysis is made to demonstrate the effectiveness of the proposed methods. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR), Processing time, security. The analysis shows that the BER and PSNR is improved in the LSB Method but security sake DCT is the best method.


Keywords: Steganography, Discrete Cosine Transform DCT, LSB Least Significant bit


Edition: Volume 5 Issue 12, December 2016,


Pages: 158 - 161


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sujit Patil, Shrikant Joshi, "A Steganography Implementation based on LSB and DCT", International Journal of Science and Research (IJSR), Volume 5 Issue 12, December 2016, pp. 158-161, https://www.ijsr.net/get_abstract.php?paper_id=27111604

Similar Articles with Keyword 'Steganography'

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade | Smita Bhosale

Share this Article

Downloads: 106

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather | Er. Megha Goyal

Share this Article
Top