A Study on Steganography to Hide Secret Message inside an Image
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 5
Abstract
Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. There are many techniques to perform Steganography on electronic media, most notably audio and image files. In this paper, we present a new steganographic technique for embedding messages in BMP image. The main goal of this method, like any Steganography techniques must do, is to hide a text of a secret message in the pixels of the image in such a manner that the human visual system is not able to distinguish between the original and the stegoimage, but it can be easily performed by a specialized reader machine. This paper includes the basis of a wavelet-based low-throughput secret key Steganography system that requires the exchange of a secret key (stego-key) prior to communication. And, a new algorithm to hide data inside image using Steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image.
Authors and Affiliations
D. Seetha1 , Dr. P. Eswaran
Strategizing Power Utilization within Intelligent Tags
Power management within intelligent Tags is one of the most important issues that must be given with utmost importance as the Tags are driven by battery power and the longevity of the battery must be increased so as to r...
Efficient Patterns Using Hidden Web Trajectory Concept
Previous Existing concepts of pattern discovery focus on background knowledge and ranking [1][2][5]. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based...
Speaker Independent Recognition System with Mouse Movements
Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limi...
Communication and Implementation of Plug and Play Enabled Devices in Sensor Network
Most of sensor networks are static in nature and do not provide standardized and systematic network management capabilities. Intelligence is not associated with the sensors. In order to make a sensor network more...
Cloud Computing: A Responsibility data sharing in the cloud computing
Cloud computing provides highly efficient services to be easily accessed or used over the Internet on as needed basis. An important feature of the cloud services is that users’ data are usually processed remotely i...