Steganography for Secure Data Transmission and Reception and Stegoanalysis
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114 | Views: 355

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.6 / 10


     

Steganography for Secure Data Transmission and Reception and Stegoanalysis

Jyoti Ashok Thange, Kailas Aade


Abstract: This paper introduces the steganography, it means hiding secure information and stegoanalysis. In Steganography message data is hiding behind cover data. Now a days number of techniques are available for hiding information such as Least Significant Bit (LSB), Discrete cosine transform (DCT), Discrete Fourier transform (DFT) and Discrete wavelet transform (DWT). The data content may be in text, audio, video or image. Basically this paper focuses on image steganography. Due to steganography it is possible to communicate between two authorized parties. This is the part of Steganography. But sometimes, it is necessary to find secure data from un-authorized parties to save our nation from terrorist hence next part of project is stegoanalysis. In stegoanalysis two types of analysis are done that is subjective analysis and objective analysis.


Keywords: PSNR, MSE, TEXTURE, VSNR, luminance, contrast, correlation, standard deviation, entropy, histogram, LSB, DCT, DFT, DWT


Edition: Volume 4 Issue 7, July 2015


Pages: 2135 - 2139



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Jyoti Ashok Thange, Kailas Aade, "Steganography for Secure Data Transmission and Reception and Stegoanalysis", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 2135-2139, https://www.ijsr.net/getabstract.php?paperid=SUB156948, DOI: https://www.doi.org/10.21275/SUB156948

Top