A Comparative Study On Some New Steganographic Techniques 

Abstract

In this paper, we present some new methods and develop techniques with algorithms for hiding text behind the gray scale image. Steganographic technique allows the sender to communicate information to the receiver without a third party even knowing that some communication is occurring. First, we embed a 512-bytes of text message in a 512 by 512 gray level image in each of the bit planes from first to eighth bit. We have also given some new techniques of embedding a text message in the entire gray level of the image itself, instead of bit levels, like hiding the text message in memory locations of image pixel values where the gray level is most repeated in column wise, row wise, abundant and odd abundant memory locations, equal / near equal to the gray level column wise, and entire image and at random locations. A comparison study is also carried out 

Authors and Affiliations

H. Faheem Ahmed , U. Rizwan

Keywords

Related Articles

A Novel Protocol for Better Energy-Efficiency, Latency and Fault Tolerance in Wireless Sensor Network 

 Wireless sensor networks with thousands of small sensor nodes are becoming very popular due to their large use in many of applications such as monitoring and collecting data from undisturbed dangerous environ...

POLY HYBRID CRYPTOGRAPHY 

This research paper discusses the Poly Hybrid Cryptography which is the science of data encryption, a technology that provides for a safe, secure, and private information exchange. It is the combination of many cryptog...

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT 

Cloud computing is a paradigm in which IT (information technology) application provide as a service. It allows users to utilize on-demand computation over internet, which is helpful for storage of data and servic...

Survey on Network Security, Threats & Firewalls  

Network security is an important task that must be seriously considered when designing a network. It defined as the policies and procedures followed by a network administrator to protect the network devices from th...

Web usage mining: Review on preprocessing of web log file

Web log data is one of the major source which contain all the information regarding the users visited links browsing pattern, time spent on a particular page. A web server log file contain information about user nam...

Download PDF file
  • EP ID EP146606
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

H. Faheem Ahmed, U. Rizwan (2013). A Comparative Study On Some New Steganographic Techniques . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 390-398. https://europub.co.uk/articles/-A-146606