A Comparative Result Analysis of Text Based SteganographicApproaches
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over thecommunication networks. But not withstanding with this advantage it also has a downside i.e. the digitized datacan be easily accessed illegally, it can be tampered with and copy. The issue of providing security to theinformation has become increasingly important with the development of computer and expanding its use indifferent areas of one's life and work[4]. One of the grounds discussed in information security is the exchange ofinformation through the cover media. In this, different methods such as cryptography, steganography, etc., havebeen used. Many approaches were introduced for making the data secure. But the efficient utilization of those approaches isn’t defined i.e. which approach to be used according to the situations. This paper implements fiveapproaches of Text Steganography to compare their Time and Space complexities by from considering threeText Steganography algorithms from the study of Monika Agarwal's paper entitled "Text SteganographicApproaches :A Comparison"[1] and bring out the comparative results of algorithm for some particular secrettext. The results of the comparisons are shown in form of bar charts and pie charts.
Authors and Affiliations
K. Aditya Kumar Prof. Suresh Pabboju
Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
Abstract: This work presents the application of a systematic review protocol for Software Engineering. This protocol is used as a formal model by applying systematic review to Service Level Man-agement. The objective is...
A survey on Fully Homomorphic Encryption
Abstract:Cloud computing is an ever-growing field in today‘s era.With the accumulation of data and the advancement of technology,a large amount of data is generated everyday.Storage, availability and security of the data...
Survey of Crop Prediction Using Different Classification Analytical Model
In this paper, there are different ways has been analyzed to predict the crop yield. Now a day, there's tremendous growth in paper publication and analysis in numerous streams for getting efficient result. The crop yield...
Novel Malware Clustering System Based on Kernel Data Structure
Abstract : An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system’s operations. Traditional malware detection approaches have based on the codecentricas...
Visual Representations in High School Edublogs
Abstract: Visuals speak a language of their own. In fact, they can have more impact than words. Whenprepared intuitively, they have the power to overcome regional barriers, in terms of comprehensibility of verballa...