A Comparative Result Analysis of Text Based SteganographicApproaches
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over thecommunication networks. But not withstanding with this advantage it also has a downside i.e. the digitized datacan be easily accessed illegally, it can be tampered with and copy. The issue of providing security to theinformation has become increasingly important with the development of computer and expanding its use indifferent areas of one's life and work[4]. One of the grounds discussed in information security is the exchange ofinformation through the cover media. In this, different methods such as cryptography, steganography, etc., havebeen used. Many approaches were introduced for making the data secure. But the efficient utilization of those approaches isn’t defined i.e. which approach to be used according to the situations. This paper implements fiveapproaches of Text Steganography to compare their Time and Space complexities by from considering threeText Steganography algorithms from the study of Monika Agarwal's paper entitled "Text SteganographicApproaches :A Comparison"[1] and bring out the comparative results of algorithm for some particular secrettext. The results of the comparisons are shown in form of bar charts and pie charts.
Authors and Affiliations
K. Aditya Kumar Prof. Suresh Pabboju
An Integrated approach for color Image Segmentation using edge and color information
Image segmentation is a fundamental and complex task in many image processing applications. In this paper, we propose a hybrid method for color image segmentation by integrating color edge information and seede...
An Approach to Secure Data Sharing for Dynamic Groups in the Cloud
Abstract: As the low maintenance, cloud computing supply an capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from a...
Enhancement of Security Levels Using a Secure Intrusion Detection System in Manets
Abstract: A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies .A Security is an important issue for ad hoc networks, especiall...
I++Mapreduce: Incremental Mapreduce for Mining the Big Data
Abstract: Data mining is an interdisciplinary area of computer engineering. Incremental processing is a challenging approach to refreshing mining results and it uses saved states to avoid the cost of re computation from...
MSESEP- Mobile Sink Based ESEP using Reliable Cluster Head and Sorting Technique
Abstract: The Wireless Sensor Network (WSN) is composed of sensors. These sensor nodes sense the physical parameters like temperature, pressure, humidity etc. In real time environment these sensors have different energie...