Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm

View through CrossRef
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The major issue is putting the security in place without disturbing the personal data. In such a case, steganography can be used as the most suitable alternative technique. Essentially, steganography is the art of hiding important data that we want to send over a channel or transmission medium. The hiding of information is made with the carrier, making the hacking of data difficult. Hiding the important data provides security and privacy at a high level. In general, there are five types of steganograph: text, audio, video, image and protocol. The carrier plays an important role in steganography. The selection of the carrier depends on the level of security. We proposed an algorithm which is useful for multi-level steganography, and is more advantageous than the standard, less significant, bit algorithm. In this paper, we used multi-level steganography. We focused on image steganography along with a fish algorithm in order to secure the text. We aimed to compare the performance of a basic algorithm to the proposed algorithm. The parameters which have been taken into consideration to compare these two algorithms are execution time and peak signal to noise ratio. We achieved the expected result which shows the applied security for the important data. We used MATLAB 10 software to get these results.
Title: Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Description:
The rapid growth of various technologies makes secure data transmission a very important issue.
The cryptography technique is the most popular method in several security cases.
The major issue is putting the security in place without disturbing the personal data.
In such a case, steganography can be used as the most suitable alternative technique.
Essentially, steganography is the art of hiding important data that we want to send over a channel or transmission medium.
The hiding of information is made with the carrier, making the hacking of data difficult.
Hiding the important data provides security and privacy at a high level.
In general, there are five types of steganograph: text, audio, video, image and protocol.
The carrier plays an important role in steganography.
The selection of the carrier depends on the level of security.
We proposed an algorithm which is useful for multi-level steganography, and is more advantageous than the standard, less significant, bit algorithm.
In this paper, we used multi-level steganography.
We focused on image steganography along with a fish algorithm in order to secure the text.
We aimed to compare the performance of a basic algorithm to the proposed algorithm.
The parameters which have been taken into consideration to compare these two algorithms are execution time and peak signal to noise ratio.
We achieved the expected result which shows the applied security for the important data.
We used MATLAB 10 software to get these results.

Related Results

Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
E-Press and Oppress
E-Press and Oppress
From elephants to ABBA fans, silicon to hormone, the following discussion uses a new research method to look at printed text, motion pictures and a te...
Analysis review on feature-based and word-rule based techniques in text steganography
Analysis review on feature-based and word-rule based techniques in text steganography
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation ...
Double Exposure
Double Exposure
I. Happy Endings Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...
MTS-Stega: Linguistic Steganography Based on Multi-Time-Step
MTS-Stega: Linguistic Steganography Based on Multi-Time-Step
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate wo...
Structural performance of fish market in Bogura district, Bangladesh
Structural performance of fish market in Bogura district, Bangladesh
One of the most important blossom trades in the economy of Bangladesh is fish marketing. To understand the current practices of fish market and marketing systems in Bogura district...

Back to Top