International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 263

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.4 / 10


     

General View on Techniques Used In Image Steganography

Jayshree V. Ingle, M. M. Bartere


Abstract: The Steganography is getting its importance due to the increase in secret communication of computer users over the internet. It can also be express as an invisible communication that actually deals with the ways of hiding the presence of the secrete message from the image. Generally that data embedding is achieved in the communication, text, image, multimedia, voice content for copyright, military communication, authentication and for many other purposes. In the image Steganography, secret communication is achieved to hide a message into the cover image. The secret message is embedded inside the cover image in encrypted format by using some hiding algorithm and it send to a receiver over a network. The receiver then it decrypted the message by applying the reverse process on the cover data and reveals the secret data. Steganography means is not to vary the structure of secret message, but hides it inside a carrier-object (cover object). After hiding process cover object and stego-object (object which contain secrete information) are similar. This paper is about to showthe two different techniques that is used in the image steganography. There are two techniques that we study in this paper are Wavelet Transform and spread spectrum.


Keywords: Cover image message, Stegno Image


Edition: Volume 4 Issue 5, May 2015


Pages: 745 - 748



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Jayshree V. Ingle, M. M. Bartere, "General View on Techniques Used In Image Steganography", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 745-748, https://www.ijsr.net/getabstract.php?paperid=SUB154196, DOI: https://www.doi.org/10.21275/SUB154196



Similar Articles

Downloads: 186 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 176 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 656 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article



Top