Comparative Study of Various Steganography Techniques
نویسندگان
چکیده
Due to the high growth in the field of Computer Networks and Internet, there is a need for a secure transfer of information over the network. The data is in a great threat to be hacked by the hackers as it is transferred over the communication channels. Image Steganography is a technique which hides secret information inside an image and conceals the existence of the communication. No one could identify whether any communication is going over the network. In recent years, many steganography techniques have been developed. This paper presents a comparative study on some of the existing steganography techniques. The PSNR value is used to measure the quality of stego images. Larger PSNR value indicates better quality of image or lower distortion.
منابع مشابه
A Survey on Various Data Hiding Techniques and their Comparative Analysis
With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this ...
متن کاملAppraise Of Multifarious Image Steganography Techniques
This paper presents a review of multifarious methods available for image steganography. The steganography is an art and science of invisible communication. The image steganography is divided into four basic terminologies viz. cover image, message, stego image, embedding and extracting algorithm. In this paper comparison of steganography with other security techniques is done. Image steganograph...
متن کاملA Comparative Study of Steganography Algorithms of Spatial and Transform Domain
Transmitting data from sender to authorized receiver through a public media (insecure media) with full security is a challenging task. From the ancient time, different methods and techniques have been adopted to gain secure transmission of information. With the development of new technologies, the techniques used for securing information have also changed. The three main technology used for sec...
متن کاملA Comparative Analysis of Image Steganography
Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and in some cases it is desired that the communication be made secret. Two techniques are available to achieve this goal: cryptography and steganography. In this paper, various digital steganographic techniques are implemented which are capable of producing a secret-embedded...
متن کاملA Comparative Analysis of Image Steganography
Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and in some cases it is desired that the communication be made secret. Two techniques are available to achieve this goal: cryptography and steganography. In this paper, various digital steganographic techniques are implemented which are capable of producing a secret-embedded...
متن کامل