International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Review of Transform Domain Techniques for Image Steganography

Sudhanshi Sharma | Umesh Kumar [6]


Abstract: In highly digitalized word, internet plays a very important role in communication. If the data in communication is confidential, then information security becomes an essential issue. Steganography is one of the technique by which we can hide data into data. Thus Steganography can keep the contents of a message secret as well as existence of the message secret. Steganography uses two kind of domain for hiding the data spatial domain (based on pixel value) and transform domain (based on frequency components). In this paper we review the two approaches of transform domain i. e. DCT & DWT for Steganography. The performance and comparison of these two techniques is measured on the basis of the parameters PSNR, MSE, Robustness & Capacity.


Keywords: Discrete Cosine Transform DCT, Discrete Wavelet Transform DWT, Mean Square Error MSE, Peak Signal-To-Noise Ratio PSNR, Steganography


Edition: Volume 4 Issue 5, May 2015,


Pages: 194 - 197


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sudhanshi Sharma, Umesh Kumar, "Review of Transform Domain Techniques for Image Steganography", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 194-197, https://www.ijsr.net/get_abstract.php?paper_id=SUB154059

Similar Articles with Keyword 'Discrete Cosine Transform DCT'

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2188 - 2194

Blind Image / Video Quality Assessment Based on DCT-Domain Statistics

Minu Thomas [4] | Saranya Sasidharan [3] | Smitha K S [3]

Share this Article

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh [7] | Swati Aggarwal

Share this Article
Top