alexa Survey on Different Methods of Image Steganography
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

Survey on Different Methods of Image Steganography

Palak R Patel, Yask Patel
  1. Department of Computer Engineering, Parul Institute of Engineering & Technology (PIET), Limda, India
  2. Assistant Professor, Dept. of I.T, Parul Institute of Engineering & Technology (PIET), Limda, India
Related article at Pubmed, Scholar Google
 

Abstract

With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of images on personal and mobile computer anytime and anywhere. At the same time, secure image archiving is becoming a major research area because the serious concern is raised about copyright protection and authority identification in digital media. A more sophisticated technique is required for future multimedia copyright protection. Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the normal. Steganography and cryptology are similar in the way that they both are used to protect important information. Nowadays the term “Information Hiding” relates to both watermarking and steganography. This paper intends to give an overview of image steganography and various techniques like Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Least Significant Bit (LSB), Hash LSB and Spread Spectrum.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords