Comparative Study of Various Steganography Techniques

نویسندگان

  • Ekta Dagar
  • Sunny Dagar
چکیده

Due to the high growth in the field of Computer Networks and Internet, there is a need for a secure transfer of information over the network. The data is in a great threat to be hacked by the hackers as it is transferred over the communication channels. Image Steganography is a technique which hides secret information inside an image and conceals the existence of the communication. No one could identify whether any communication is going over the network. In recent years, many steganography techniques have been developed. This paper presents a comparative study on some of the existing steganography techniques. The PSNR value is used to measure the quality of stego images. Larger PSNR value indicates better quality of image or lower distortion.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Various Data Hiding Techniques and their Comparative Analysis

With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this ...

متن کامل

Appraise Of Multifarious Image Steganography Techniques

This paper presents a review of multifarious methods available for image steganography. The steganography is an art and science of invisible communication. The image steganography is divided into four basic terminologies viz. cover image, message, stego image, embedding and extracting algorithm. In this paper comparison of steganography with other security techniques is done. Image steganograph...

متن کامل

A Comparative Study of Steganography Algorithms of Spatial and Transform Domain

Transmitting data from sender to authorized receiver through a public media (insecure media) with full security is a challenging task. From the ancient time, different methods and techniques have been adopted to gain secure transmission of information. With the development of new technologies, the techniques used for securing information have also changed. The three main technology used for sec...

متن کامل

A Comparative Analysis of Image Steganography

Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and in some cases it is desired that the communication be made secret. Two techniques are available to achieve this goal: cryptography and steganography. In this paper, various digital steganographic techniques are implemented which are capable of producing a secret-embedded...

متن کامل

A Comparative Analysis of Image Steganography

Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and in some cases it is desired that the communication be made secret. Two techniques are available to achieve this goal: cryptography and steganography. In this paper, various digital steganographic techniques are implemented which are capable of producing a secret-embedded...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014