A Steganography Approach to Protect Secret Information in Computer Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 326

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.2 / 10


     

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat


Abstract: Everyone use computer networks to share resource and to exchange information. Protection of data is a demanding issue in todays era. The prevalent part of the data or information pass throughout the internet and it becomes difficult to make data secure. There arise a need of data hiding. Steganography is different as the study of hidden communication. Steganography is the skill and science of hiding a pinnacle secret communication in a cover media such as image, text, signals or sound in such a approach that nobody, with the exception of the intentional beneficiary knows the existence of the data. This paper express the thought to protect secret information in computer network by means of exploring initially what is the steganography, cryptography and DWT and the necessities associated to steganography. In this paper, we implemented the security and data hiding technique that are used to implement a steganography.


Keywords: steganography, computer security, Information hiding, image processing, communication


Edition: Volume 4 Issue 4, April 2015


Pages: 907 - 910



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Prajakta B. Diwan, V. B. Bhagat, "A Steganography Approach to Protect Secret Information in Computer Network", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 907-910, https://www.ijsr.net/getabstract.php?paperid=SUB153054, DOI: https://www.doi.org/10.21275/SUB153054

Top