Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 128 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of Steganography enhances rather than replaces encryption. Messages are not secure simply by virtue of being hidden.

Keywords: Stego-object, Cover-object, Steganalysis, Cover Image, Embedding key, Extraction key, Steganography

Edition: Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Share this Article

How to Cite this Article?

Harjeet Kaur, Er Divya Goyal, "Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15833, Volume 4 Issue 1, January 2015, 2319 - 2323

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Stego-object'

Downloads: 117 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar

Share this Article

Downloads: 121 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 745 - 748

General View on Techniques Used In Image Steganography

Jayshree V. Ingle, M. M. Bartere

Share this Article

Downloads: 128 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this Article

Similar Articles with Keyword 'Cover-object'

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Downloads: 128 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this Article

Similar Articles with Keyword 'Steganalysis'

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1899 - 1903

Design of Application to Detect Images Embedded with Malicious Programs

Robert T. R. Shoniwa, Geogen George

Share this Article

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Downloads: 117 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 626 - 631

Data Hiding In Digital Image Using MD5 and DES

Harsimranjeet Kaur

Share this Article

Similar Articles with Keyword 'Cover Image'

Downloads: 102 | Weekly Hits: ⮙5 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Downloads: 108 | Monthly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this Article

Downloads: 109 | Weekly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Similar Articles with Keyword 'Embedding key'

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 111 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1251 - 1253

Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream

Vaibhav Sonyabapu Barve, S. S. Bere

Share this Article

Downloads: 128 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this Article

Similar Articles with Keyword 'Steganography'

Downloads: 101 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 102 | Weekly Hits: ⮙5 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article



Top