Secure Transmission of Compound Information Using Image Steganography

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 4

Abstract

The security of information handled in real time transmission reception like internet is of paramount consideration, as this information may be confidential. And also, the parameter in concern nowa- days is size as it makes large amount of data to be at a single place. This paper proposes a technique for the simultaneous transmission of multiple data securely. We took an advantage of less space required for storing an image than that of a wav file. The proposed technique brings down the required channel capacity to transfer secret data in real time systems besides improving robustness

Authors and Affiliations

Lalitha. G , Ashish Jain , U. Raja

Keywords

Related Articles

A Novel Approach for Controlling a Size of a Test Suite with Simple Technique

Software testing is an important activity in the software evelopment life cycle. and also expensive phase when ompared to all other phases of the software development life cycle. Software testing purpose is to etect,s...

Model based approach for Detection of Architectural Distortions and Spiculated Masses in Mammograms

This paper investigates detection of Architectural Distortions (AD) and spiculated masses in mammograms based on their physical characteristics. We have followed a model based approach which separates the abnormal patter...

Load Balanced Routing using OSPF

Today’s Internet applications are in need of additional bandwidth. The Internet nature changes and its traffic are growing because of new applications. Initially when the file transfers dominated the internet we don’t re...

An Experiential Survey on Image Mining Tools, Techniques and Applications

Digitization in every sector leads to the growth of digital data in a tremendous amount. Digital data are not only available in the form of text but it is also available in the form of images, audio and video. Decision m...

Power Control Algorithm for Wireless Sensor Networks using N-Policy M/M/1 Queueing Model

A critical issue in wireless sensor networks is the limited vailability of power and hence optimizing power is very important. In any sensor node, transitions from idle to busy state and vice versa consume most of the po...

Download PDF file
  • EP ID EP129516
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Lalitha. G, Ashish Jain, U. Raja (2011). Secure Transmission of Compound Information Using Image Steganography. International Journal on Computer Science and Engineering, 3(4), 1645-1648. https://europub.co.uk/articles/-A-129516