Steganographic Method of Data Hiding using JPEG Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 344 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.9 / 10


     

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali


Abstract: Steganography is an art of concealing the fact that communication is taking place, by hiding information in other information. Different formats can be used as medium, but digital images are the most popular in that, because of their frequency in the web. For hiding secret data in images there exist a large variety of steganographic methods, i. e. there exist complex method to simpler ones. Different applications may adopt different steganography techniques. Some applications may require complete invisibility of the secret information while some other may require a larger secret message to be hidden. This paper gives an overview of steganographic method in which we hide both text message and digital image in another digital image. To this end, the widely adopted framework for the development of the steganographic system is the minimal distortion embedding, in which a well-designed distortion function is the most important.


Keywords: JPEG steganography, uniform embedding, cover image, stego image, discrete cosine transform, quantization


Edition: Volume 4 Issue 11, November 2015


Pages: 1175 - 1178



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Shabana Vathelil Subair, Fathima A Muhammadali, "Steganographic Method of Data Hiding using JPEG Images", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1175-1178, https://www.ijsr.net/getabstract.php?paperid=NOV151370, DOI: https://www.doi.org/10.21275/NOV151370

Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article
Top