Image Steganography

Abstract

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. This paper intends to give an overview of image steganography, its uses . 

Authors and Affiliations

Rahul Joshi1 , Lokesh Gagnani , alony Pande

Keywords

Related Articles

TOSCA ENABLING CLOUD PORTABILITY

The cloud is a computing architecture characterized by a large number of interconnected identical computing devices that can scale on demand and that communicate via an IP network. Many technologies commonly associated w...

A Survey on Energy-Efficient protocol for Wireless Sensor Networks 

Wireless Sensor Network has become one of the hot topics now a days although; it has been already applied in the use of many different areas. Such as the Home Automation, it is very common to find its use on the...

Additional Band width Design with Adaptive Orthogonal Frequency Division multiplexing  

With the advent of new high data rate wireless applications, as well as growth of existing wireless services, demand for additional band width is rapidly increasing. A cognitive radio (CR) node is a radio device...

A Review on Concurrency Fault Detection Techniques 

The UML is the most common language that is used for system modeling. But, this language has been designed as a general purpose modeling language that might need modeling constructs for the specific real time embed...

Analysis of Power Utilization and different Routing Protocols in Mobile Ad Hoc Network (MANET)

Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features f...

Download PDF file
  • EP ID EP93595
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Rahul Joshi1, Lokesh Gagnani, alony Pande (2013). Image Steganography. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(1), 224-227. https://www.europub.co.uk/articles/-A-93595