Information Security through Steganography Technique
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
The encrypted messages will often attract the concentration of unauthorized users. They try to crack the encrypted message and get access to the actual contents of the message. To conceal the subsistence of message steganography is introduced by hiding a secret message inside another credulous message. Steganography deals with composing hidden messages so that only the sender and the receiver know that the message even exists. Since nobody except the sender and the receiver knows the existence of the message, it does not attract unwanted attention. There are different methods for steganography such as text, image, audio & video. Out of above methods, image steganography is most popular due to vast amount of images on the Internet. There are different techniques for hiding information in cover object. One of the oldest & popular methods is least significant digit method. It hides data in the lowest bit of any image. In this paper we use different medium for hiding secret information using LSB technique.
Authors and Affiliations
Vijay Prakash, Aakash Gupta
Design of Sewage Treatment Plant to Recycle Waste Water Produced From Residential Buildings
In this present scenario, the primary objective of this proposal of treatment plant design is to restore the availability of water resources and its optimal usage. Another foremost objective of this investigation is to...
Clym Yeobright’s Irony in Hardy’s Return of The Native
Irony is a literary device in which the difference between intention and performance is shown. It is an effect that figures heavily in hardy’s novel. The theme itself contains role of irony, because man can never just w...
Data Hiding Using Block Based Mosaic Images in Video
In today’s modern world the digital technologies have helped peoples to exchange data on large due to availability of fast internet connectivity it has become very easy to exchange data. The security, integrity and reli...
Forward and Backward Sweep Algorithm for Distribution Power Flow Analysis and Comparison of Different Load Flow Methods
Power flow analysis is a very important and fundamental tool for the analysis of any electrical distribution system and is used in the operational as well as planning stages. Certain applications particularly in distrib...
A Comparative Study of Various Cloud Computing Applications
In this recent scenario various organizations and companies are trying to reduce their cost like IT infrastructure, network and software. In this way, cloud technology is very useful powerful and flexible software envir...