Author(s): R.Poornima | R.J.Iswarya
Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252
Volume: 4;
Issue: 1;
Start page: 23;
Date: 2013;
VIEW PDF
DOWNLOAD PDF
Original page
Keywords: Steganography | Encryption | Image Domain | Transform Domain
ABSTRACT
Hiding Capacity plays a vital role for efficient covert communication. This is achieved bySteganography. Steganography is the science ofhiding the information into the other information so thatthe hidden information appears to be nothing to the human eyes. There are many ways to hide informationinside an image, audio/video, document etc. But Image Steganography has its own advantages and is mostpopular among the others. This paper gives a review of various methods such as image domain andtransformation domain algorithms available for implementing Image Steganography. In this paper, a high-capacity Image Steganography schemes are discussed for different file formats. Covert communication istaking place by encrypting the password for information to be protected. The intended receiver will decryptthe information using that password.
Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252
Volume: 4;
Issue: 1;
Start page: 23;
Date: 2013;
VIEW PDF


Keywords: Steganography | Encryption | Image Domain | Transform Domain
ABSTRACT
Hiding Capacity plays a vital role for efficient covert communication. This is achieved bySteganography. Steganography is the science ofhiding the information into the other information so thatthe hidden information appears to be nothing to the human eyes. There are many ways to hide informationinside an image, audio/video, document etc. But Image Steganography has its own advantages and is mostpopular among the others. This paper gives a review of various methods such as image domain andtransformation domain algorithms available for implementing Image Steganography. In this paper, a high-capacity Image Steganography schemes are discussed for different file formats. Covert communication istaking place by encrypting the password for information to be protected. The intended receiver will decryptthe information using that password.