International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 267

Research Paper | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016 | Popularity: 6.7 / 10


     

A Steganography Implementation based on LSB and DCT

Sujit Patil, Shrikant Joshi


Abstract: In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat Steganography by detecting the hidden information and extracting. In this paper a comparative analysis is made to demonstrate the effectiveness of the proposed methods. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR), Processing time, security. The analysis shows that the BER and PSNR is improved in the LSB Method but security sake DCT is the best method.


Keywords: Steganography, Discrete Cosine Transform DCT, LSB Least Significant bit


Edition: Volume 5 Issue 12, December 2016


Pages: 158 - 161



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sujit Patil, Shrikant Joshi, "A Steganography Implementation based on LSB and DCT", International Journal of Science and Research (IJSR), Volume 5 Issue 12, December 2016, pp. 158-161, https://www.ijsr.net/getabstract.php?paperid=27111604, DOI: https://www.doi.org/10.21275/27111604



Similar Articles

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article

Downloads: 106

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather, Er. Megha Goyal

Share this Article

Downloads: 106

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

Downloads: 108

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2200 - 2202

Security Enhanced RDH Image Steganography by RRBE

Saranya.M, Aswani.K

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1420 - 1426

A Chosen-Plaintext Attack on Permutation-Only Image Encryption Schemes and Steganography on Images

Soja Prasannan, Devi Murali

Share this Article
Top