Enviar pesquisa
Carregar
Ijetcas14 335
•
0 gostou
•
248 visualizações
Iasir Journals
Seguir
Educação
Tecnologia
Arte e fotografia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
Digital image compression techniques
Digital image compression techniques
eSAT Publishing House
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Journal For Research
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
Journal For Research
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
IAEME Publication
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
IJERA Editor
G0210032039
G0210032039
researchinventy
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
International Journal of Technical Research & Application
Recomendados
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
Digital image compression techniques
Digital image compression techniques
eSAT Publishing House
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Journal For Research
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
Journal For Research
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
IAEME Publication
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
IJERA Editor
G0210032039
G0210032039
researchinventy
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
International Journal of Technical Research & Application
Implementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
H018114956
H018114956
IOSR Journals
A Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
International Journal of Engineering Inventions www.ijeijournal.com
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Editor IJMTER
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
iosrjce
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
IJCSIS Research Publications
20120140504016
20120140504016
IAEME Publication
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
IAEME Publication
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image Compression
Editor IJMTER
Ijariie1132
Ijariie1132
IJARIIE JOURNAL
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
Himanshu Bal
L045056469
L045056469
IJERA Editor
Image Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
CSCJournals
C010511420
C010511420
IOSR Journals
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
Image steganography
Image steganography
vaidya_sanyu
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
ijcsit
Ijetcas14 399
Ijetcas14 399
Iasir Journals
Ijetcas14 448
Ijetcas14 448
Iasir Journals
Mais conteúdo relacionado
Mais procurados
Implementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
H018114956
H018114956
IOSR Journals
A Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
International Journal of Engineering Inventions www.ijeijournal.com
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Editor IJMTER
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
iosrjce
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
IJCSIS Research Publications
20120140504016
20120140504016
IAEME Publication
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
IAEME Publication
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image Compression
Editor IJMTER
Ijariie1132
Ijariie1132
IJARIIE JOURNAL
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
Himanshu Bal
L045056469
L045056469
IJERA Editor
Image Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
CSCJournals
C010511420
C010511420
IOSR Journals
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
Image steganography
Image steganography
vaidya_sanyu
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
ijcsit
Mais procurados
(20)
Implementation of image steganography using lab view
Implementation of image steganography using lab view
H018114956
H018114956
A Survey of Image Based Steganography
A Survey of Image Based Steganography
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
20120140504016
20120140504016
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image Compression
Ijariie1132
Ijariie1132
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
L045056469
L045056469
Image Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
C010511420
C010511420
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image steganography
Image steganography
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
Destaque
Ijetcas14 399
Ijetcas14 399
Iasir Journals
Ijetcas14 448
Ijetcas14 448
Iasir Journals
Ijetcas14 523
Ijetcas14 523
Iasir Journals
Ijetcas14 345
Ijetcas14 345
Iasir Journals
Ijetcas14 323
Ijetcas14 323
Iasir Journals
Ijebea14 207
Ijebea14 207
Iasir Journals
Ijetcas14 313
Ijetcas14 313
Iasir Journals
Ijetcas14 361
Ijetcas14 361
Iasir Journals
Ijetcas14 438
Ijetcas14 438
Iasir Journals
Ijetcas14 409
Ijetcas14 409
Iasir Journals
Ijetcas14 444
Ijetcas14 444
Iasir Journals
Ijetcas14 393
Ijetcas14 393
Iasir Journals
Ijetcas14 394
Ijetcas14 394
Iasir Journals
Ijetcas14 446
Ijetcas14 446
Iasir Journals
Aijrfans14 223
Aijrfans14 223
Iasir Journals
Ijebea14 211
Ijebea14 211
Iasir Journals
Aijrfans14 271
Aijrfans14 271
Iasir Journals
Aijrfans14 294
Aijrfans14 294
Iasir Journals
Ijetcas14 378
Ijetcas14 378
Iasir Journals
Destaque
(19)
Ijetcas14 399
Ijetcas14 399
Ijetcas14 448
Ijetcas14 448
Ijetcas14 523
Ijetcas14 523
Ijetcas14 345
Ijetcas14 345
Ijetcas14 323
Ijetcas14 323
Ijebea14 207
Ijebea14 207
Ijetcas14 313
Ijetcas14 313
Ijetcas14 361
Ijetcas14 361
Ijetcas14 438
Ijetcas14 438
Ijetcas14 409
Ijetcas14 409
Ijetcas14 444
Ijetcas14 444
Ijetcas14 393
Ijetcas14 393
Ijetcas14 394
Ijetcas14 394
Ijetcas14 446
Ijetcas14 446
Aijrfans14 223
Aijrfans14 223
Ijebea14 211
Ijebea14 211
Aijrfans14 271
Aijrfans14 271
Aijrfans14 294
Aijrfans14 294
Ijetcas14 378
Ijetcas14 378
Semelhante a Ijetcas14 335
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
IOSR Journals
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
ijtsrd
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
ijtsrd
Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
IJCSIS Research Publications
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
theijes
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
CSCJournals
S4501105108
S4501105108
IJERA Editor
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
ijtsrd
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
ijtsrd
Ijetr042105
Ijetr042105
Engineering Research Publication
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value Indicator
CSCJournals
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
Image Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
Semelhante a Ijetcas14 335
(20)
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
S4501105108
S4501105108
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Ijetr042105
Ijetr042105
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value Indicator
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Image Steganography Techniques
Image Steganography Techniques
Mais de Iasir Journals
ijetcas14 650
ijetcas14 650
Iasir Journals
Ijetcas14 648
Ijetcas14 648
Iasir Journals
Ijetcas14 647
Ijetcas14 647
Iasir Journals
Ijetcas14 643
Ijetcas14 643
Iasir Journals
Ijetcas14 641
Ijetcas14 641
Iasir Journals
Ijetcas14 639
Ijetcas14 639
Iasir Journals
Ijetcas14 632
Ijetcas14 632
Iasir Journals
Ijetcas14 624
Ijetcas14 624
Iasir Journals
Ijetcas14 619
Ijetcas14 619
Iasir Journals
Ijetcas14 615
Ijetcas14 615
Iasir Journals
Ijetcas14 608
Ijetcas14 608
Iasir Journals
Ijetcas14 605
Ijetcas14 605
Iasir Journals
Ijetcas14 604
Ijetcas14 604
Iasir Journals
Ijetcas14 598
Ijetcas14 598
Iasir Journals
Ijetcas14 594
Ijetcas14 594
Iasir Journals
Ijetcas14 593
Ijetcas14 593
Iasir Journals
Ijetcas14 591
Ijetcas14 591
Iasir Journals
Ijetcas14 589
Ijetcas14 589
Iasir Journals
Ijetcas14 585
Ijetcas14 585
Iasir Journals
Ijetcas14 584
Ijetcas14 584
Iasir Journals
Mais de Iasir Journals
(20)
ijetcas14 650
ijetcas14 650
Ijetcas14 648
Ijetcas14 648
Ijetcas14 647
Ijetcas14 647
Ijetcas14 643
Ijetcas14 643
Ijetcas14 641
Ijetcas14 641
Ijetcas14 639
Ijetcas14 639
Ijetcas14 632
Ijetcas14 632
Ijetcas14 624
Ijetcas14 624
Ijetcas14 619
Ijetcas14 619
Ijetcas14 615
Ijetcas14 615
Ijetcas14 608
Ijetcas14 608
Ijetcas14 605
Ijetcas14 605
Ijetcas14 604
Ijetcas14 604
Ijetcas14 598
Ijetcas14 598
Ijetcas14 594
Ijetcas14 594
Ijetcas14 593
Ijetcas14 593
Ijetcas14 591
Ijetcas14 591
Ijetcas14 589
Ijetcas14 589
Ijetcas14 585
Ijetcas14 585
Ijetcas14 584
Ijetcas14 584
Último
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Celine George
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
National Information Standards Organization (NISO)
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
Maksud Ahmed
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
9548086042 for call girls in Indira Nagar with room service
9548086042 for call girls in Indira Nagar with room service
discovermytutordmt
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
iammrhaywood
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
TechSoup
mini mental status format.docx
mini mental status format.docx
PoojaSen20
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Maestría en Comunicación Digital Interactiva - UNR
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
JemimahLaneBuaron
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
sanyamsingh5019
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
anjaliyadav012327
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
FatimaKhan178732
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
Thiyagu K
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Thiyagu K
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
Thiyagu K
Último
(20)
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
9548086042 for call girls in Indira Nagar with room service
9548086042 for call girls in Indira Nagar with room service
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
mini mental status format.docx
mini mental status format.docx
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
Ijetcas14 335
1.
International Association of
Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 134 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 A Steganography Technique for Hiding Information in Image Kamred Udham Singh Department of Computer Science, Faculty of Science Banaras Hindu University, Varanasi, (U.P.), INDIA _______________________________________________________________________________________ Abstract: In the area of Information Security, hiding the facts and communication from third parties is the most important factor of information technology. Security is concerned with the protection and safeguard of that information which, in its various forms can be identified Information Assets. To protect the Information from the third party we use the message hiding technique called steganography. Steganography is art and science of invisible communication. This paper deals with image steganography. For hiding secret information in images, there are number of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Various steganographic algorithms like Least Significant Bit (LSB) algorithm, Jsteg and F5 algorithms, from all of these.We are going to use LSB algorithm. This paper gives a brief idea and overview of image steganography that make use of Least Significant Bit (LSB) algorithm for hiding the data into image. Keywords: Decryption, Encryption, LSB (Least Significant Bit, Steganography), Stego key __________________________________________________________________________________________ I. Introduction The most important factor of information technology and communication is the security of information. The idea of information hiding is not new in the history. Various methods have been developed to hide data in order to keep the message secret. Sometimes it is not enough to keep the contents of a message secret but it may also be necessary to keep the existence of the message secret. Steganography is the art and science of invisible communication of messages. It is implemented by hiding the existence of the communicated information in image, video and audio. The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing”[1] defining it as “covered writing”. The graphical representation of Steganography system presented in fig: 1. Figure: 1 The idea and practice of hiding information has a long history. In Histories the Greek historian Herodotus writes of a nobleman, Histaeus, who needed to communicate with his son-in-law in Greece. He shaved the head of one of his most trusted slaves and tattooed the message onto the slave’s scalp. When the slave’s hair grew back the slave was dispatched with the hidden message [2]. The difference between Steganography and Cryptography is that the cryptography focuses on keeping the contents of a message secret whereas steganography focuses on keeping the existence of a message secret [3]. Steganography and cryptography both techniques are protecting information from undesired parties. There are two other technologies which are related to steganography are watermarking and fingerprinting. There are three components in steganography structure: Carrier image,
2.
Kamred Udham Singh,
International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043, pp. 134-137 IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 135 Message, Key. This paper describes the LSB algorithm used for image steganography to the security potential of steganography for business and personal use. In this paper, we describe the LSB algorithm used for image steganography to the security potential of steganography for business and personal use. Section II described basics of Encryption and Decryption techniques. Section III discuss about compression of image files i.e. lossy or lossless. In Section IV surveyed of least significant bit (LSB) algorithm and how it works on image files. Finally, Section V concludes the Paper. II. Encryption and Decryption In encryption the secret information is hiding in image file. In Decryption secret information is extract from image file. When a text message embedded with image a key is needed. This key is used to help in encryption and it decided that where the information should be hidden in the image. A short text can be use as a key. III. Image Compressions Image compression is a process of minimizing the size in bytes of a graphics file without demeaning the quality of the image. Microsoft Document Imaging Format (MDI) or Tagged Image File Format (TIFF), image compression is used to reduce the size of the file. There are two types of image compression: lossy and lossless [4]. These both methods are used to save storage space, but the implementing procedures are distinct. Lossy image compression creates slighter files by dumping excess image data from the original image. And it also removes that details which are too tiny for the human eye to differentiate [6].On the other side Lossless image compression never removes any information from the original image, but instead represents data in mathematical formulas [6]. The original image’s integrity is maintained and the decompressed image output is bit-by-bit identical to the original image input [4]. Lossless compression image formats are GIF (Graphical Interchange Format) and 8-bit and 24 bit BMP (Bitmap) [5]. Lossless image compression keeps the original digital image intact without the chance of lost. IV. Concepts of Image File An image is a collection of numbers of pixels. These pixels are displayed horizontally row by row. The number of bits in a color scheme, called the bit depth, refers to the number of bits used for each pixel. The smallest bit depth is 8, it means that there are 8 bits used to describe the color of each pixel. Grayscale images use 8 bits for each pixel and able to display 256 different colors. Digital color images are stored in 24-bit files and use the RGB color model that is known as true color. All colors of 24- bit image are most frequently represented as additive combinations of red (R), blue (B), and green (G), and each primary color is represented by 8 bits. In one given pixel, there can be 256 different quantities of red, green and blue [7]. We can represent over 16 million colors with 24 bits. The representation of RGB colors in a [R, G, B] format is [0, 0, 0] for black, and [255, 255, 255] for white. Grayscale colors will be represented by a single number for example black has a value of 0, white is 255 and light gray is 200 V. Images and Transform Domain Image steganography techniques are two type first is Image Domain and second is Transform Domain [8]. In transform domain, images are first transformed and then the message is embedded in the image [10]. Image domain techniques cover bit-wise methods that apply bit insertion and noise manipulation [11]. Lossless image compression formats are most suitable for image domain steganography techniques are usually dependent on the image format [12]. Steganography in the transform domain involves the manipulation of algorithms and image transforms [11].These methods hide messages in more significant areas of the cover image, making it more robust [9].
3.
Kamred Udham Singh,
International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043, pp. 134-137 IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 136 VI. LEAST SIGNIFICANT BIT TECHNIQUE Least significant bit (LSB) insertion is a most popular and easy approach to hide information in carrier image file. In the LSB method byte is replaced with an M‟s bit. This technique is best for image steganography. To the human eye the stego image will look identical to the carrier image. An image file is simply a file which shows different colors on the different areas of an image. The most popular image formats that use lossless compression is 24 Bit BMP (Bitmap), use for hiding information. It is a easier to hide information inside in a high quality and resolution image. Due to their size 24 Bit images are best for hiding information. But you can also choose 8 Bit BMP‟s or another image format such as GIF [13]. The least significant bit is used to change with the bit of secret message. In 24-bit image, one pixel can store 3 bits by changing a bit of each of the red, green and blue color components. For example we have three adjacent pixels (9 bytes) with the RGB encoding [14] (figure 4)- Figure: 4 Figure: 5 Table 1: Advantage of LSB algorithm Binary representation of number 400 is 110010000 embedded into the least significant bits of this part of the image. If we overlay these 9 bits over the LSB of the 9 bytes above we get the following (where bits in bold and underline have been changed) (figure5) Number 400 was embedded into the grid and LSB have changed according to the embedded message. VII. LSB algorithm Select an image of size M*N for an input. The message to be hidden in RGB component only of an image. Use a pixel selection filter to obtain the best areas to hide information in the cover image to obtain an enhanced rate. The filter is applied to Least Significant Bit (LSB) of every pixel to hide information, leaving most significant bits (MSB). After that Message is hidden using Bit Replacement method. Fig: 6 Algorithm of Least Significant Bit Benefits of LSB Algoritm: There are two main advantage of Least Significant Bit algorithm which described in following table: Message Security A least significant bit technique uses 24 bit BMP images, because it is a lossless compression image formats. In a 24 bit BMP image for hiding the secret data , there is the need of large cover image. Before embedding it in digital image message data is converted in digital image in to byte. So this approach is secure, prevent from liability. Reduce Distortion Rate Mostly images are used in steganography as a cover objects. 24 bit BMP (Bitmap) is use for hiding information because it is a lossless compression image formats. To hide the message in image, first it is converted into byte format and then stored in byte array. After that message is encrypted and then embeds each bit into the LSB position of each pixel position. This approach involves change in least significant bit (LSB) of each pixel byte. Hence reduces the distortion rate that is look of original image. 10010100 00001100 11001001 10010111 00001110 11001011 10011111 00010001 11001011 10010101 00001101 11001000 10010110 00001111 11001010 10011110 00010000 11001010
4.
Kamred Udham Singh,
International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043, pp. 134-137 IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 137 VIII. Result and conclusion In this paper the existing Least Significant Bit Algorithm has been analyzed and found can effectively hide a message inside a digital image file. There are many applications of image steganography which are used for secretly and covertly communication. Main use of image steganography is, communication of high- level or top-secret documents between international governments. Image steganography has many illegal uses as it can be used by hackers to send viruses and Trojans. Image steganography increase the security of the message by hiding it in a less obvious location. IT also describes the benefits from approach like security of message increases and distortion rate has reduced. References [1] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf [2] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 [3] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, October2004 [4] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf [5] Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998 [6] “Reference guide: Graphics Technical Options and Decisions”,http://www.devx.com/projectcool/Article/19997 [7] Owens, M., “Adiscussion of covert channels and steganography”, SANS Institute, 2002 [8] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 [9] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM,47:10, October2004 [10] Lee, Y.K. & Chen, L.H., “High capacity image steganographic model”, Visual Image Signal Processing, 147:03, June 2000 [11] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April1998 [12] Venkatraman, S., Abraham, A. & Paprzycki, M., “Significance of Steganography on Data Security”, Proceedings of the International Conference on Information Technology: Coding and Computing, 2004 [13] V. Lokeswara Reddy, Dr.A.Subramanyam, Dr.P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats”, Int. J. Advanced Networking and Applications 868 Volume: 02, Issue: 05, Pages: 868-872 (2011) [14] T. Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceeding of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sand to South Africa, June/July 2005
Baixar agora