Downloads: 123 | Views: 274
Research Paper | Computer Science & Engineering | Iraq | Volume 4 Issue 1, January 2015 | Popularity: 6.6 / 10
Steganography Technique for Binary Text Image
Zainalabideen Abdual Samad Rasheed
Abstract: In last decades different techniques have been created for hiding information. The role of hiding information is to create a secure communication between authorize parties in terms of exchange their vital data in safe channel. Steganography is a method of hiding data in such an approach no one can feel there is a hidden data or found it. I. e. Only the authorize party can extract these data because he know the achievement of hiding information. in this paper, an efficient method of hiding binary text image via an optimal using of Fibonacci sequence. Digital image is considered to be the cover image. A binary text image is used to represent the secret message instead of normal text. This method is used for the purpose of having a chance to read the binary text image if should any modification happen along the communication channel. (E. g. JPEG compression). A binary text image is an image which includes a text and can be construct by using any software for image processing like paint.
Keywords: Steganography, image quality, Traditional Fibonacci, Bit Plan
Edition: Volume 4 Issue 1, January 2015
Pages: 132 - 138
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1319 - 1323Advanced Technique for Comprehensive Data Security
Pramendra Kumar, Vijay Kumar Sharma
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Downloads: 105
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2541 - 2544Reversible Data Embedding using F5 Algorithm
Sanjivani Koli, N. B. Pokale