A Survey on various types of Steganography and Analysis of Hiding Techniques

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 11, Issue 8

Abstract

Digital Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. Under this assumption, if the feature is visible, the point of attack is evident, thus the here goal is conceal to the existence of the embedded data .This is totally review paper, in which we provide the comparison of available steganography technology hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography. The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego -image is transformed from spatial domain to the frequency domain.

Authors and Affiliations

Navneet Kaur , Sunny Behal

Keywords

Related Articles

Analytical Performance of LDPC Codes with OC in the Presence of Interferers

Optimum Combining (OC) with Low Density Parity-check (LDPC) code improves the performance of overall system (LDPC-OC) by providing additional coding gain. Using Gaussian approximation (GA) approach the bit error rate of...

 A HYBRID BIOMETRIC AUTHENTICATION ALGORITHM

 A facial recognition system is a computer based application for automatically identifying or verifying a person from a digital image. One of the ways to do this is by comparing the selected facial features from t...

 Fingerprint Recognition by Minutiae Matching Method for Evaluating Accuracy

 Today, Fingerprint recognitions are used for person identification and verification. In fingerprint recognition, matching methods and algorithms are most important for research area. Matching methods based on the d...

 VHDL Design and Implementation for Optimum Delay & Area for Multiplier & Accumulator Unit by 32-Bit Sequential Multiplier

 High performance systems such as microprocessors, digital signal processors, filters, ALU etc. which is need of hour now days requires a lot of components. One of main component of these high performance system...

 CFD Analysis of Pressure Coefficient for NACA 4412

 in this paper NACA 4412 airfoil profile is considered for analysis of wind turbine blade. Geometry of the airfoil is created using GAMBIT 2.4.6. And CFD analysis is carried out using FLUENT 6.3.26 at various angles...

Download PDF file
  • EP ID EP99853
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

Navneet Kaur, Sunny Behal (2014). A Survey on various types of Steganography and Analysis of Hiding Techniques. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 11(8), 388-392. https://europub.co.uk/articles/-A-99853