International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015


Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur | Er Divya Goyal


Abstract: Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of Steganography enhances rather than replaces encryption. Messages are not secure simply by virtue of being hidden.


Keywords: Stego-object, Cover-object, Steganalysis, Cover Image, Embedding key, Extraction key, Steganography


Edition: Volume 4 Issue 1, January 2015,


Pages: 2319 - 2323


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Harjeet Kaur, Er Divya Goyal, "Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 2319-2323, https://www.ijsr.net/get_abstract.php?paper_id=SUB15833

Similar Articles with Keyword 'Steganalysis'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar | Vijay Kumar Sharma [2]

Share this Article
Top