Downloads: 111 | Views: 305
Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 8, August 2017 | Popularity: 6.2 / 10
New Steganography Technique
Shahbaa Mohammed
Abstract: Recently there has been an increase in the use of the internet, people use it as a part of their daily lives. And to secure their data, steganography and cryptography are used. Here we suggest using a new steganography technique to hide multiple colored images in a single one by using Discrete Wavelet Transform (DWT). The cover image is represented by three color model which is H (Hue), S (Saturation) and I (Intensity), and the secret images are hidden in them. Multiple levels of the cover image are decomposed and the secret images are hidden in them and some of the similar frequencies components are merged. The hidden images are extracted from the stego image. By using this technique the changes done are less noticeable on the stego image compared to the original one with increased security.
Keywords: Stego image, Steganography, HIS, N-level DWT
Edition: Volume 6 Issue 8, August 2017
Pages: 1767 - 1769
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1319 - 1323Advanced Technique for Comprehensive Data Security
Pramendra Kumar, Vijay Kumar Sharma
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Downloads: 105
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2541 - 2544Reversible Data Embedding using F5 Algorithm
Sanjivani Koli, N. B. Pokale