Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Hybrid Image Steganography Method

View through CrossRef
This is age of fast communication and data revolution. Huge amount of data is transmitted and received in every second utilizing the current infrastructure. Providing the security and maintaining integrity of the data while it is being transferred through the public channels is a challenging task. Steganography can be used in this purpose by concealing the data inside text, image, audio or video file formats and send the files to the other end. This paper gives an overview of various image steganography methods. To hide secret information in images various steganographic methods are available which have their own pros and cons. In this paper we have discussed the types of image steganography. Here we propose two different image steganography methods using Modified Least Significant Bits (LSB) and Discrete Wavelet Transform (DWT) methods. Also, the results are analyzed using different parameters like Peak signal to noise ratio(PSNR), Mean Square Error(MSE) to find out the efficiency of the proposed methods.
Title: A Hybrid Image Steganography Method
Description:
This is age of fast communication and data revolution.
Huge amount of data is transmitted and received in every second utilizing the current infrastructure.
Providing the security and maintaining integrity of the data while it is being transferred through the public channels is a challenging task.
Steganography can be used in this purpose by concealing the data inside text, image, audio or video file formats and send the files to the other end.
This paper gives an overview of various image steganography methods.
To hide secret information in images various steganographic methods are available which have their own pros and cons.
In this paper we have discussed the types of image steganography.
Here we propose two different image steganography methods using Modified Least Significant Bits (LSB) and Discrete Wavelet Transform (DWT) methods.
Also, the results are analyzed using different parameters like Peak signal to noise ratio(PSNR), Mean Square Error(MSE) to find out the efficiency of the proposed methods.

Related Results

Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The...
Analysis review on feature-based and word-rule based techniques in text steganography
Analysis review on feature-based and word-rule based techniques in text steganography
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation ...
Generative Image Steganography Based on Point Cloud
Generative Image Steganography Based on Point Cloud
Abstract In deep steganography, the model size is usually related to the underlying mesh resolution, and a separate neural network needs to be trained as a message extracto...
Double Exposure
Double Exposure
I. Happy Endings Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...
Introduction to Linguistic Steganography
Introduction to Linguistic Steganography
AbstractThe specialty of data covering up has gotten much consideration in the late years as security of data has turn into a major concern in this web time. As sharing of delicate...

Back to Top