Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Journal of emerging technologies and innovative research
Survey of 2D &3D Image Steganography Techniques for Data Security System2020 •
Image steganography refers to hiding information i.e. text, images or audio files in another image or video files. The current project aims to use steganography for an image with another image using spatial domain technique. This hidden information can be retrieved only through proper decoding technique. This examination displays an outline of different threedimensional (3D) picture steganography methods from overview perspective. This paper exhibit scientific categorization of 3D picture steganography systems and distinguish the ongoing advances in this field. Steganalysis and assaults on 3D picture steganography calculations have likewise been examined. 3D picture steganography strategies in all the three spaces: geometrical, topological and portrayal areas have been contemplated and thought about among each other on different parameters, for example, inserting limit, reversibility and reaction towards assaults. A few difficulties which restrain the advancement of 3D steganography...
Kalpa Publications in Engineering
A Survey Paper on Different Steganography TechniqueWith the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. So in this digital scenario invisible communication between two parties is the prime concern. Steganography is the technique of hidden communication. It not only hides the message contents, instead it hides the existence of the message. In this paper, a new image steganography method based on spatial domain is proposed secret data hided in image segments using least significant bit (LSB) steganography is proposed. The color image is divided into four equal parts and the secret data is also divided into four equal parts and those divided data is hided in the image segments using least significant bit steganography. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.
Annals of the University of Craiova Mathematics and Computer Science Series
3D Steganography Models2008 •
international journal for research in applied science and engineering technology ijraset
Digital Image Steganography2020 •
Steganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others. Therefore, the goal is to hide the existence of the secret data. Using steganography techniques, secret data can be concealed within an appropriate multimedia carrier, such as, image, audio, text files; among which digital image is the most widely used carrier format. Different steganography techniques are available, some are more advanced than the others, having strong and weak points respectively. The suitable technique can be selected as per the application requirement. The main objectives of steganography are undetectability, untraceable, robustness, and capacity of secret data. These are the factors that make it different from techniques such as cryptography. This paper analysis the uses of steganography and its techniques. It additionally aims to determine which steganography technique is more suitable for a certain application.
2019 •
The evolving of Internet technology has achieved to the need of high level of data safety during its spread. For this purpose steganography shows a main role in society. Steganography is mostly the art of secretly hiding data or message in any cover media such as an image, audio or video. Hence it allows secret communiqué to take place without the information of any unintended user. This article gives a brief overview of image steganography and the techniques used for hiding data in the original image to get stego-image. The estimate of performance is based on the PSNR value.The aim of Steganography is to maintain secret communication between two events. This paper shows how Steganography is used in a new situation while providing a practical understanding of what Steganography is and how to complete it. In this research there exists a large change of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different techniq...
So as to have a mystery offering of information, visual cryptography plan permits imparting a mystery picture to information installed in it. Existing routines in picture steganography concentrate on implanting mystery information in high contrast pictures. "A Steganography framework is generally made out of insertion and extraction. The implanted mystery document in picture must be extricated by the trusted party. The mystery picture is 5% more noteworthy than the measure of the record. Different advanced information concealing strategies have been produced for sight and sound administrations, where a lot of mystery information is implanted in the host. It ought to additionally be recovered just by those approved. The principle issue of record stowing away in an alternate host picture or different documents is a lot of information that obliges an extraordinary information. In the proposed framework a procedure to implant a content document into a hued picture without contortion is utilized.
Journal of emerging technologies and innovative research
Review of vital techniques for hiding confidential data using image steganography2018 •
The quick advancement in the exchange of information through internet made it easier to exchange information exact and faster to the receiver. Security of data is one of the huge components of information technology and communication. Steganography is a term used for information hiding and it is an art of hidden writing. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. So, that observer cannot find the hidden information which we want to send to the receiver. Steganography main objective is to provide robustness, detectability, capacity of hidden data due to which it differs from other techniques such as watermarking and cryptography. This paper proposes a various technique used to hide information on image by an image steganography. In image steganography we hide our secret data in image so that the observer cannot feel its existence. Image steganography strategies are as of late been useful to send any secret message in the ...
With the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. So in this digital scenario invisible communication between two parties is the prime concern. Steganography is the technique of hidden communication. It not only hides the message contents, instead it hides the existence of the message. In this paper, a new image steganography method based on spatial domain is proposed secret data hided in image segments using least significant bit (LSB) steganography is proposed. The color image is divided into four equal parts and the secret data is also divided into four equal parts and those divided data is hided in the image segments using least significant bit steganography. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.
2015 •
Steganography is the science of hiding the fact that communication is taking place, by hiding information behind information. Many different carrier file formats can be used, but digital media are the most popular because of their usage on the Internet. For hiding secret information in digital media, there exists a large variety of steganography techniques some are more complex than others and all of them have some advantages and disadvantage. Various applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret data, while others require a larger secret data to be hidden. This paper intends to give an overview of Digital media steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which stenographic techniques are more suitable for which applications.
Frontline (2009)
ISRAEL'S FOUNDATION MYTHS EXPOSED The Ethnic Cleansing of Palestine -Ilan Pappe Oneworld Publications 2007 313 pages, paperback £9.992023 •
2020 •
Intervenciones y escultura virreinal. Historia e interpretación
[2022] "¿Objeto artístico o herramienta devocional? Los cuerpos relicario, un caso de olvido historiográfico". Intervenciones y escultura virreinal, historia y representación. Fanny Unikel y Patricia Díaz (coord.) México: UNAM-Instituto de Investigaciones Estéticas.2022 •
2023 •
Nonmonogamy, polyamory: definitions, pastoral perspectives, and theology
Chapter 23 TAM polyamory2024 •
Which Story Shall We Tell?
Which Story Shall We Tell? (Chapter 10 with Afterword and Appendices to "Romans 9 and the Story Paul Was Telling")2023 •
The Routledge Handbook of Classics and Queer Theory
How To Do The History of Elagabalus2023 •
Journal of Personality Assessment
Dimensionality, Reliability, Invariance, and Validity of the Multidimensional Social Anxiety Response Inventory–21 (MSARI–21)2019 •
BMC pharmacology & toxicology
Classification and prediction of toxicity of chemicals using an automated phenotypic profiling of Caenorhabditis elegans2018 •
Revista Complutense de Educación
Saberes compartidos entre estudiantes de magisterio de un intercambio transnacional en formato Blended Learning2020 •
PPAR Research
PPARα Gene Is Involved in Body Composition Variation in Response to an Aerobic Training Program in Overweight/Obese2021 •
Journal of Materials Chemistry A
A review on the recent advancements in graphene-based membranes and their applications as stimuli-responsive separation materials2021 •