Classification of Image Steganography Techniques in Spatial Domain: A Study
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 3
Abstract
Steganography is a method of secret communication wherein the very existence of communication is hidden. During the last few decades there have been a tremendous development in digital image steganography and a large number of papers have been published by different researchers. This review paper presents a classification of the spatial domain image steganography techniques. These classifications include, (i) LSB steganography, (ii) RGB based steganography, (iii) pixel value differencing steganography, (iv) mapping based steganography, (v) palette based steganography, (vi) collage based steganography, (vii) spread spectrum steganography, and (viii) code based steganography. In image steganography the different quality measurement parameters are, (i) capacity, (ii) security, (iii) imperceptibility, (iv) temper resistance, and (v) computational complexity. Different researchers have attempted to improve the different quality measurement parameters. At the end of the paper the current promising directions of research are also pointed out.
Authors and Affiliations
Gandharba Swain , Saroj Kumar Lenka
Remote Job Servicing in Partitioned Public Cloud
Cloud computing is a way of offering different “things” as services. Public cloud is a popular deployment model of cloud computing. With its huge infrastructure, it offers its services to customers all over the world. Ma...
A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks
In a mobile ad hoc network (MANET), frequent link breakage occures due to mobility of nodes which leads to frequent route discoveries. This overhead of route discovery cannot be tolerated. Broadcasting is a fundamental d...
An Efficient Baugh-WooleyArchitecture forBothSigned & Unsigned Multiplication
This project presents an efficient implementation of a high speed multiplier using the shift and adds method of Baugh-Wooley Multiplier. This parallel multiplier useslesser adders and lesser iterative steps. As a result...
A SURVEY ON ENERGY CONSUMPTION IN WIRELESS ROVING APPLICATION
Recent days, the energy consumption of mobile and tablet devices has become most familiar problem in android operating system. Android is an open source code which is easily understandable and handle by the users to get...
Trust Worthy Framework for Wireless Sensor Networks
A Wireless Sensor Network (WSN) consists of spatially scattered self-directed sensors to agreeably monitor physical or ecological conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Trust i...