Downloads: 120
Research Paper | Computer Science & Engineering | Iraq | Volume 4 Issue 2, February 2015
Suitable Data Hiding Technique for Windows Phone
Zainalabideen Abdual Samad Rasheed [3]
Abstract: People today are widely interest for exchanging their information through various communication tools which are development rapidly lately. for that reasons a secure communication is very important part to change vital data in safe way. Steganography can create a confident network to interchange the confidential information between sender and receiver. In this paper, some steganography techniques have been analyzed, implemented and test. The goal of the project is to present a summary of some image steganography to pinpoint the requirements of a best steganography method. The selected approach is chosen to be as an application under mobile phone. This application should be able to hide a secret message and retrieve the secret message from stego- image too. Steganography techniques have been tested under personal computer using mat lab software for comparative purpose in terms of image quality, capacity, time and robustness which are considered the main requirements for smart phone application
Keywords: Time, Capacity, image quality, key necessity and spatial domain
Edition: Volume 4 Issue 2, February 2015,
Pages: 588 - 591
Similar Articles with Keyword 'Time'
Downloads: 179 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker | Ashok Veda [2]
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar [12] | Hima Saxena [2] | Dr. Suman Sharma [5]