Comparative analysis of Stegnography Algorithms on the Basis of PSNR value & cover file size

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: With the rapid growth in the field of technology, there is always a requirement of development of fast and secure algorithms. Steganography is used to provide confidentiality over the transmitted data or the stored data. There were many steganography algorithms proposed to provide security but there is always a competition to develop a algorithm which is fast, secure, having high PSNR value and less cover file size. In this paper, authors have discussed such papers and compare it with each others.

Authors and Affiliations

Shubhi Jain , Sini Shibu

Keywords

Related Articles

 Towards Accurate Estimation of Fingerprint Ridge Orientation  Using BPNN and Ternarization

 Accurate estimation of ridge orientation is a crucial step in fingerprint image enhancement because the performance of a minutiae extraction algorithm and matching heavily relies on the quality of the input fin...

 A New Classifier Based onRecurrent Neural Network UsingMultiple Binary-Output Networks

Abstract:Conventional classifiers have several outputs equal to the number of classes (N) which imposes somuch complexityto the classifiers,both in training and testing stages. Instead of using one extra-large andcomplic...

An Effective m-Health System for Antenatal and Postnatal Care in Rural Areas of Bangladesh

Abstract: In South Asia, Maternal Mortality Rate (MMR) is so high due to the lack of health facility, doctor’s insufficiency, lack of communication facility and also the poverty. Bangladesh is also suffering from this un...

 A Practical Approach Forparallel Image Processing

This review paper tries to solve the problem of processing big data of images on Apache Hadoop using Hadoop Image Processing Interface (HIPI) for storing and efficient distributed processing, combined with OpenCV, an ope...

 Comparative Analysis of Smart Card Authentication Schemes

 Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a var...

Download PDF file
  • EP ID EP136898
  • DOI 10.9790/0661-1637106110
  • Views 77
  • Downloads 0

How To Cite

Shubhi Jain, Sini Shibu (2014).  Comparative analysis of Stegnography Algorithms on the Basis of PSNR value & cover file size. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 106-110. https://europub.co.uk/articles/-A-136898