International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117

Review Papers | Information Technology | India | Volume 3 Issue 11, November 2014


Data Hiding Using Steganography: A Review

Nishigandha P. Mangle | Prof. Sanjay S. Dhopte


Abstract: Internet technologies are currently charring an important role in our day to day life. It has the benefit as well as disadvantages also. Which in term generates the wants of data activity technology for maintaining the secrecy of the key information. In this paper, we have a tendency to gift a completely unique high bit rate LSB Image data activity technique. The fundamental plan of the proposed LSB algorithmic program is knowledge embedding that causes token embedding distortion of the host image. Using the planned ballroom dance algorithmic program, knowledge activity bit are embedded into higher LSB layers, ensuing in increased strength against noise addition or image compression. Listening tests showed that the perceptual quality of knowledge hided image is higher within the case of the proposed technique than within the common place LSB technique.


Keywords: Higher LSB, Guard Pixels, Steganography, Multi- carrier, Information hiding, data Encryption


Edition: Volume 3 Issue 11, November 2014,


Pages: 461 - 465


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte, "Data Hiding Using Steganography: A Review", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 461-465, https://www.ijsr.net/get_abstract.php?paper_id=OCT14821

Similar Articles with Keyword 'Steganography'

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J. [2]

Share this Article

Downloads: 113

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive | Neelesh Gupta | Meha Khare

Share this Article
Top