Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Proposed Algorithm Using Image in Multi Level Text Steganography

View through CrossRef
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data. In such case, steganography can be used as a most suitable technique. Basically steganography is the art and technique of hiding important data which we want to send over a channel or transmission medium. The hiding of information is made with the carrier so the the hacking of data will be difficult. Generally, we have two choices to hide the data, i.e. image or video. For effectual and fortunate embedded process, it is very important to select correct pixel in a video image. These pixels are playing important role in storage of secret information. Here, we are focused on the text based steganography.Generally, there are various types of the steganography viztext, audio, video, image type, protocol type etc. Carrier plays an important role in the steganography. This carrier is also known as the cover. In this present study, we aim to evaluate the carrier on text steganography. We proposed an algorithm which is useful for the multi-level text steganography, which is more advantageous than the standard least significant bit algorithm. Two different tests were used to prove proposed algorithm and checked the time of implementation needed for both algorithm and Peak Signal to Noise Ratio to new image. MATLAB was used to implement algorithm, which was most useful computational language.
Title: Proposed Algorithm Using Image in Multi Level Text Steganography
Description:
The newly emerging technologies enable us to deliver and share the information in the form of multimedia.
However, the major issue is security without disturbing the personal data.
In such case, steganography can be used as a most suitable technique.
Basically steganography is the art and technique of hiding important data which we want to send over a channel or transmission medium.
The hiding of information is made with the carrier so the the hacking of data will be difficult.
Generally, we have two choices to hide the data, i.
e.
image or video.
For effectual and fortunate embedded process, it is very important to select correct pixel in a video image.
These pixels are playing important role in storage of secret information.
Here, we are focused on the text based steganography.
Generally, there are various types of the steganography viztext, audio, video, image type, protocol type etc.
Carrier plays an important role in the steganography.
This carrier is also known as the cover.
In this present study, we aim to evaluate the carrier on text steganography.
We proposed an algorithm which is useful for the multi-level text steganography, which is more advantageous than the standard least significant bit algorithm.
Two different tests were used to prove proposed algorithm and checked the time of implementation needed for both algorithm and Peak Signal to Noise Ratio to new image.
MATLAB was used to implement algorithm, which was most useful computational language.

Related Results

Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
Analysis review on feature-based and word-rule based techniques in text steganography
Analysis review on feature-based and word-rule based techniques in text steganography
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation ...
E-Press and Oppress
E-Press and Oppress
From elephants to ABBA fans, silicon to hormone, the following discussion uses a new research method to look at printed text, motion pictures and a te...
MTS-Stega: Linguistic Steganography Based on Multi-Time-Step
MTS-Stega: Linguistic Steganography Based on Multi-Time-Step
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate wo...
Double Exposure
Double Exposure
I. Happy Endings Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
<span style="font-size:11pt"><span style="background:#f9f9f4"><span style="line-height:normal"><span style="font-family:Calibri,sans-serif"><b><spa...

Back to Top