A Technique To Hide Information Within Image File For Secure Transmission

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3

Abstract

 In today’s world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden.This project report intends to give an overview of image steganography, its use and techniques. It also helps to choose which stegnographic technique are suitable for which application and also attempts to identify the requirements of a good steganography algorithm.

Authors and Affiliations

Keywords

Related Articles

 Software Engineering Process in Web Application Development

 Abstract: The methods used for the development of conventional software engineering models cannot be useddirectly for the development of web based applications. This paper identifies and analyses the variousadaptat...

 Effect of Using Reclaimed Asphalt Pavement on Asphalt MixPerformance

 Abstract: Throughout history, the earth`s resources have been exploited without considering their eventuallimitations. At present, one of the key challenges is to concentrate on saving natural resources for futureg...

 Android Malware: Study and analysis of malware for privacy  leak in ad-hoc network 

 Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games.  Sma...

 Data Mining: Solving the Thirst of Recommendations to Users

 Abstract: Internet usage attains a peek level in these days. It is portable due to arrival of smart phones. Peoplecan enquire information about any products they are in need using the Electronic sites. Their needs...

 Protection of Direct and Indirect Discrimination using Prevention  Methods

 Along with privacy, discrimination is a very important issue when considering the legal and ethical aspects of data mining. It is more than observable that the majority people do not want to be discriminated &nbs...

Download PDF file
  • EP ID EP101505
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

(2016).  A Technique To Hide Information Within Image File For Secure Transmission. IOSR Journals (IOSR Journal of Computer Engineering), 18(3), 38-43. https://europub.co.uk/articles/-A-101505