A Comparative Study On Some New Steganographic Techniques
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
In this paper, we present some new methods and develop techniques with algorithms for hiding text behind the gray scale image. Steganographic technique allows the sender to communicate information to the receiver without a third party even knowing that some communication is occurring. First, we embed a 512-bytes of text message in a 512 by 512 gray level image in each of the bit planes from first to eighth bit. We have also given some new techniques of embedding a text message in the entire gray level of the image itself, instead of bit levels, like hiding the text message in memory locations of image pixel values where the gray level is most repeated in column wise, row wise, abundant and odd abundant memory locations, equal / near equal to the gray level column wise, and entire image and at random locations. A comparison study is also carried out
Authors and Affiliations
H. Faheem Ahmed , U. Rizwan
A Novel Protocol for Better Energy-Efficiency, Latency and Fault Tolerance in Wireless Sensor Network
Wireless sensor networks with thousands of small sensor nodes are becoming very popular due to their large use in many of applications such as monitoring and collecting data from undisturbed dangerous environ...
POLY HYBRID CRYPTOGRAPHY
This research paper discusses the Poly Hybrid Cryptography which is the science of data encryption, a technology that provides for a safe, secure, and private information exchange. It is the combination of many cryptog...
HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT
Cloud computing is a paradigm in which IT (information technology) application provide as a service. It allows users to utilize on-demand computation over internet, which is helpful for storage of data and servic...
Survey on Network Security, Threats & Firewalls
Network security is an important task that must be seriously considered when designing a network. It defined as the policies and procedures followed by a network administrator to protect the network devices from th...
Web usage mining: Review on preprocessing of web log file
Web log data is one of the major source which contain all the information regarding the users visited links browsing pattern, time spent on a particular page. A web server log file contain information about user nam...