Image Steganography using LSB and LSB+Huffman Code
نویسندگان
چکیده
منابع مشابه
Robust Steganography Using LSB-XOR and Image Sharing
Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret messagecharacter ASCII-binary value (or, secret imagepixel value). The stego-key-image is sh...
متن کاملImage Steganography Using LSB and Edge – Detection Technique
217 Abstract -Steganography is the technique of hiding the fact that communication is taking place, by hiding data in other data. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others ...
متن کاملAn Overview of Image Steganography using LSB Technique
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...
متن کاملMultistage Three Layers Image Steganography Using LSB with Enhanced Security
Now-a-days a fast growth of internet in the present world, social networking websites like Twitter& Facebook are being increasingly used by individuals of all over the world to share their life activities and events via images. But this vastly popular observable fact of image sharing on internet is exposed to a lot of risks. At present, these social networking websites are not bounded by string...
متن کاملImage/message Steganography using LSB insertion Algorithms for DRM system
Digital Rights Management (DRM) system is the effective scheme for digital transactions. The main disadvantage of DRM is that once the content is decrypted, it can be easily copied using widely available utilities. It can be removed by using protection system like steganography. Steganography is the art of communicating in a way which hides a secret message into the main information or cover. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/17370-7896