A Steganography Approach to Protect Secret Information in Computer Network

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

Everyone use computer networks to share resource and to exchange information. Protection of data is a demanding issue in today’s era. The prevalent part of the data or information pass throughout the internet and it becomes difficult to make data secure. There arise a need of data hiding. Steganography is different as the study of hidden communication. Steganography is the skill and science of hiding a pinnacle secret communication in a cover media such as image, text, signals or sound in such a approach that nobody, with the exception of the intentional beneficiary knows the existence of the data. This paper express the thought to protect secret information in computer network by means of exploring initially what is the steganography, cryptography and DWT and the necessities associated to steganography. In this paper, we implemented the security and data hiding technique that are used to implement a steganography.

Authors and Affiliations

Keywords

Related Articles

Evaluation Social Ties and Trust in Online Social Network

In this research work we have built a systems which pulls tweets , pre-process each tweet to remove unwanted artifacts and the gives stemming treatment to each token in the tweet to finally get the score value which is c...

Performance Analysis of Central Gas Turbine Power Station, Edjeba, Delta State, Nigeria

Performance Analysis of Central Gas Turbine Power Station, Edjeba, Delta State, Nigeria

A New Method for Construction of MV-optimal Generalized Group Divisible Designs with two Groups

In this article, we consider the construction of generalized group divisible designs with two groups (GGDD(2)) from balanced incomplete block designs (BIBD). We also discuss MV-optimality of these designs.

Secret Digital Image Sharing Using Natural Image Based VSS Scheme

Visual cryptography is a technique of sharing secret images. This technique encrypts a secret image into number of shares. Combining these shares generates the original image and it can be directly recognized by the huma...

Simulation and Performance Comparison of Dual arm Mach Zehnder Modulator and Single arm Mach Zehnder Modulator in Duobinary Transmission System

"Duobinary signal is a three level signal which has higher dispersion tolerance and better bandwidth efficiency than conventional binary signal formats. Optical duobinary signal can be generated by using either a dual a...

Download PDF file
  • EP ID EP364125
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

(2015). A Steganography Approach to Protect Secret Information in Computer Network. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-364125