International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 119 | Views: 228

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 6, June 2015 | Rating: 6.5 / 10


A Secure Image Stegnography Process

Sakshi [65] | Jaspreet Kaur [15]


Abstract: Steganography is available to gain its significance due to the exponential growth and covert communication of possible computer users over the internet. It can also be distinct as the study of imperceptible communication that typically deals with the ways of hiding the survival of the communicate message. A usually data embed is achieved in message, image, text, voice or multimedia content for rights, military message, verification and many other purpose. In image Steganography, secret message is achieved to establish significance into cover image and generate a stego image, generated image which is carrying a hidden message. This paper has analyzed various steganographic techniques like DWT, NN, DCT, GA, Embedding algorithm with their advantages as well as disadvantages.


Keywords: Steganography, Data hiding, envelop symbols, Information Security, Least Significant Bit and techniques


Edition: Volume 4 Issue 6, June 2015,


Pages: 1358 - 1360

Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments

Characters: 0


Type Your Registered Email Address below to Rate the Article


Verification Code will appear in 2 Seconds ... Wait

Top