International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 8, August 2017


New Steganography Technique

Shahbaa Mohammed [4]


Abstract: Recently there has been an increase in the use of the internet, people use it as a part of their daily lives. And to secure their data, steganography and cryptography are used. Here we suggest using a new steganography technique to hide multiple colored images in a single one by using Discrete Wavelet Transform (DWT). The cover image is represented by three color model which is H (Hue), S (Saturation) and I (Intensity), and the secret images are hidden in them. Multiple levels of the cover image are decomposed and the secret images are hidden in them and some of the similar frequencies components are merged. The hidden images are extracted from the stego image. By using this technique the changes done are less noticeable on the stego image compared to the original one with increased security.


Keywords: Stego image, Steganography, HIS, N-level DWT


Edition: Volume 6 Issue 8, August 2017,


Pages: 1767 - 1769


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shahbaa Mohammed, "New Steganography Technique", International Journal of Science and Research (IJSR), Volume 6 Issue 8, August 2017, pp. 1767-1769, https://www.ijsr.net/get_abstract.php?paper_id=ART20176336

Similar Articles with Keyword 'Stego image'

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair [2] | Fathima A Muhammadali

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam | Nishigandha Khandagale | Poonam Yadav

Share this Article
Top