Hiding Existence of Communication Using Image Steganography
S. Nimje1 , A. Belkhede2 , G. Chaudhari3 , A. Pawar4 , K. Kharbikar5
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-3 , Page no. 163-166, Mar-2014
Online published on Mar 30, 2014
Copyright © S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar, “Hiding Existence of Communication Using Image Steganography,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.163-166, 2014.
MLA Style Citation: S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar "Hiding Existence of Communication Using Image Steganography." International Journal of Computer Sciences and Engineering 2.3 (2014): 163-166.
APA Style Citation: S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar, (2014). Hiding Existence of Communication Using Image Steganography. International Journal of Computer Sciences and Engineering, 2(3), 163-166.
BibTex Style Citation:
@article{Nimje_2014,
author = {S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar},
title = {Hiding Existence of Communication Using Image Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {163-166},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=90},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=90
TI - Hiding Existence of Communication Using Image Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 163-166
IS - 3
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3494 | 3411 downloads | 3615 downloads |
Abstract
Now a day, maintaining the security of the secret information has been a great challenge. Sending message habitually through a communication channel like internet draws the attention of third parties and hackers, perhaps causing attempts to break and expose the sent messages. Some solutions to be discussed is how to pass information in manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Besides hiding data for secret communication, an approach of information hiding can be extended to copyright protection for digital media. In this paper, we propose modified LSB technique for Image Steganography to hide secret message i.e. Text, Image, Audio and Video in an Image which makes it harder for unauthorised people to extract the original message.
Key-Words / Index Term
Stego-File, Cover-Image, Modified LSB
References
[1]. Ramanpreet Kaur, Prof. Baljit Singh, �Survey and Analysis of various Steganographic Techniques� , ISSN:2250-3676, Volume-2, Isuue-3, 561-566
[2]. T. Morkel, J.H.P. Eloff, M.S. Olivier, �An Overview Of Image Stegnography�, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa.
[3]. Mehdi Hussain and Mureed Hussain, �A Survey of Image Steganography Techniques� , International Journal of Advanced Science and Technology Vol. 54, May, 2013
[4]. Joyshree Nath, Asoke Nath, �Advanced Steganography Algorithm using Encrypted secret message�, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, March 2011
[5]. Shilpa Gupta, Geeta Gujral and Neha Aggarwal, �Enhanced Least Significant Bit algorithm For Image Steganography�, IJCEM International Journal of Computational Engineering & Management, Vol. 15 Issue 4, July 2012 ISSN (Online): 2230-7893, www.IJCEM.org