A STUDY ON OVERVIEW OF STEGANOGRAPHY WITH SPECIFIC TOOLS
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
t -Steganography is a science for invisible communication and play vital role on the network security. The security process is manipulated with the different tools and technology. The technology is provided secured environment to the network user via Least Significant Bit Insertion, Masking and Filtering Algorithm and Transformations. Using this technology many applications are developed to implement Steganography in the real time applications. This paper discussed the implementation procedure of available tool for encoding and decoding which covers all the data formats including Text, Image, Audio, and Video. All the tools and the implementation of online and off line implications are addressed along with the procedure.
Authors and Affiliations
A. Sankara Narayanan
Mixed Pixels: A Challenge in Remote Sensing Data Classification for Improving Performance
Remote Sensing (RS) refers to the science of identification of earth surface features and estimation of their geo-biophysical properties using electromagnetic radiation as a medium of interaction. Spectral, spatial...
EKST: Efficient Keyword Searching Technique for Encrypted Data in CipherCloud
cloud, coming days is accustomed, more and more receptive data are being centralized into the cloud. In cloud, we make perceptive information habitually have to be ciphertext before outsourcing because of protectin...
Gabor Filter, PCA and SVM Based Breast Tissue Analysis and Classification
Early signs of breast cancer are revealed in Mammographic images. This experiment focuses towards the identification of relevant, representative and more important, discriminate image features for analysis of medic...
Selective on-demand protocol for finding reliable nodes to form stable paths in ADHOC networks
A wireless adhoc network consists of a group of wireless nodes which can dynamically self-organize themselves into a temporary topology to form a network without using any existing infrastructure. Generally adhoc...
Speech based Emotion Recognition with Gaussian Mixture Model
This paper is mainly concerned with speech based emotion recognition. The main work is concerned with Gaussian mixture model (GMM model) which allows training the desired data set from the databases. GMM are known...