Study of Image steganography using LSB, DFT and DWT

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 5

Abstract

In this paper we have studied and implement the color image steganography using LSB, DFT and DWT. First we have studied the various literatures of LSB, DFT and DWT and then implemented one system in which we can do steganography using these techniques, after implementation we have evaluated the results using these techniques applying various image formats against different message size. For each of the cases we have calculated  the MSE and PSNR and presented here in a tabulated form. Our main intention is to show how MSE and PSNR changes with respect to different image formats and different message sizes using these techniques. Besides the analysis of MSE and PSNR we have also analyzed the message insertion and message extraction time for all the cases.

Authors and Affiliations

Juned Ahmed Mazumder, K. Hemachandran

Keywords

Related Articles

Modern technology applications and rainfall flooding disasters prevention.

The paper presents a case study that investigated the role of modern technology applications in rainfall flooding disasters prevention. The results reported demonstrated that modern technology facilities can be used to d...

A Survey on SmartPhone Honeypot

Smartphones are becoming   a dominant form of mobile computing in the world. The Smartphone, as a platform, blends a traditional general computing platform with a specialized mobile phone platform. The general computin...

A Feature Vector Compression Approach for Face Recognition using Convolution and DWT

The biometric identification of a person using face trait is more efficient compared to other traits as the co-operation of a person is not required. In this paper, we propose a feature vector compression approach for fa...

Factors influencing motivation level of academic staff in Education of IBA Community College Khairpur Mir's

To investigate the degree to which various factors influence motivation level of academic staff of IBA Community College Khairpur Mir's. The study has utilized a questionnaire survey. Participants were 40 (24 male, 16 fe...

COMPRO-MOTO: An efficient approach for identifying compromised nodes in wireless sensor networks.

Wireless sensor networks (WSNs) are exposed and being attacked by opponents as they are randomly deployed in open environments. Opponents can extract confidential information like secret keys by inserting their own nodes...

Download PDF file
  • EP ID EP650341
  • DOI 10.24297/ijct.v11i5.1143
  • Views 68
  • Downloads 0

How To Cite

Juned Ahmed Mazumder, K. Hemachandran (2013). Study of Image steganography using LSB, DFT and DWT. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 11(5), 2618-2627. https://europub.co.uk/articles/-A-650341