Javascript must be enabled to continue!
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
View through CrossRef
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The major issue is putting the security in place without disturbing the personal data. In such a case, steganography can be used as the most suitable alternative technique. Essentially, steganography is the art of hiding important data that we want to send over a channel or transmission medium. The hiding of information is made with the carrier, making the hacking of data difficult. Hiding the important data provides security and privacy at a high level. In general, there are five types of steganograph: text, audio, video, image and protocol. The carrier plays an important role in steganography. The selection of the carrier depends on the level of security. We proposed an algorithm which is useful for multi-level steganography, and is more advantageous than the standard, less significant, bit algorithm. In this paper, we used multi-level steganography. We focused on image steganography along with a fish algorithm in order to secure the text. We aimed to compare the performance of a basic algorithm to the proposed algorithm. The parameters which have been taken into consideration to compare these two algorithms are execution time and peak signal to noise ratio. We achieved the expected result which shows the applied security for the important data. We used MATLAB 10 software to get these results.
Southwest Jiaotong University
Title: Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Description:
The rapid growth of various technologies makes secure data transmission a very important issue.
The cryptography technique is the most popular method in several security cases.
The major issue is putting the security in place without disturbing the personal data.
In such a case, steganography can be used as the most suitable alternative technique.
Essentially, steganography is the art of hiding important data that we want to send over a channel or transmission medium.
The hiding of information is made with the carrier, making the hacking of data difficult.
Hiding the important data provides security and privacy at a high level.
In general, there are five types of steganograph: text, audio, video, image and protocol.
The carrier plays an important role in steganography.
The selection of the carrier depends on the level of security.
We proposed an algorithm which is useful for multi-level steganography, and is more advantageous than the standard, less significant, bit algorithm.
In this paper, we used multi-level steganography.
We focused on image steganography along with a fish algorithm in order to secure the text.
We aimed to compare the performance of a basic algorithm to the proposed algorithm.
The parameters which have been taken into consideration to compare these two algorithms are execution time and peak signal to noise ratio.
We achieved the expected result which shows the applied security for the important data.
We used MATLAB 10 software to get these results.
Related Results
A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
A unified understanding of terms and their applicability is essential
for every scientific discipline: steganography is no exception. Being
divided into several domains (for instan...
A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
<p>A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (f...
A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
A unified understanding of terms and their applicability is essential
for every scientific discipline: steganography is no exception. Being
divided into several domains (for instan...
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
<span style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; ...
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
Sleep Habits and Occurrence of Lowback Pain among Craftsmen
<span style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; ...
Social Economic Determinants of Adoption of Fish Farming in Gem Sub-County, Siaya County, Kenya
Social Economic Determinants of Adoption of Fish Farming in Gem Sub-County, Siaya County, Kenya
The demand for fish in Kenya has been steadily increasing, prompting the exploration of alternative methods such as fish farming to address this rising demand. However, the adoptio...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....

