Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Intelligence System for Data Hiding Behind an Image

View through CrossRef
Steganography is the art and science of writing hidden messages in such a way that no one apart from sender and intended recipient even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted form. This is where steganography can come into play. While cryptography provides privacy, steganography is intended to provide secrecy. The aim of steganography is to hide the secret messages and also for communication and transferring of data. Steganography is also used in transferring the information of credit card or debit card to e-commerce for purchasing items. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data. This intends to give an overview of image steganography and its uses and hiding the files (text file, audio file etc) by using LSB and AES algorithm where AES used for password protecting system so that if anyone can find the stego image they will not read the message because data still in the encrypt form and LSB is used for hiding the data.
Title: Intelligence System for Data Hiding Behind an Image
Description:
Steganography is the art and science of writing hidden messages in such a way that no one apart from sender and intended recipient even realizes there is a hidden message.
There are often cases when it is not possible to send messages openly or in encrypted form.
This is where steganography can come into play.
While cryptography provides privacy, steganography is intended to provide secrecy.
The aim of steganography is to hide the secret messages and also for communication and transferring of data.
Steganography is also used in transferring the information of credit card or debit card to e-commerce for purchasing items.
So no one apart from the authorized sender and receiver will be aware of the existence of the secret data.
This intends to give an overview of image steganography and its uses and hiding the files (text file, audio file etc) by using LSB and AES algorithm where AES used for password protecting system so that if anyone can find the stego image they will not read the message because data still in the encrypt form and LSB is used for hiding the data.

Related Results

Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among...
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
The present study explains how different factors of knowledge hiding (e.g., evasive, playing dumb, and rationalized) influence on team creativity. Drawn on social exchange theory, ...
A novel pattern-based reversible data hiding technique for video steganography
A novel pattern-based reversible data hiding technique for video steganography
Abstract This paper explains a novel pattern based color video data hiding technique based on moving regions detection. In the proposed system first the video gets separate...
APPLICATION OF CUTTER–JORDAN–BOSSEN METHOD FOR DATA HIDING IN THE IMAGE SPATIAL AREA
APPLICATION OF CUTTER–JORDAN–BOSSEN METHOD FOR DATA HIDING IN THE IMAGE SPATIAL AREA
The article deals with the main methods of digital steganography and presents a classification scheme. Special attention is paid to Cutter–Jordan–Bossen method for hiding data in t...
Why and When Do Employees Hide Their Knowledge?
Why and When Do Employees Hide Their Knowledge?
This study establishes a theoretical and integrative framework for analyzing the relationship between knowledge hiding and task performance. The existing literature indicates that ...
Competition and profit hiding: evidence from banks in China
Competition and profit hiding: evidence from banks in China
Purpose – The purpose of this paper is to investigate the quality of financial reporting by banks in China, and the profit hiding behavior of banks in particular. ...
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu
The massive Internet of Things (IoT) connecting various types of intelligent sensors for goods tracking in logistics, environmental monitoring and smart grid management is a crucia...
Double Exposure
Double Exposure
I. Happy Endings Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...

Back to Top