ENGINEERING RESEARCH PAPERS

steganography IEEE PAPER 2017




Reversible Texture Synthesis Using Three Level Security in Steganography
free download

ABSTRACT A texture synthesis process resample a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. the texture synthesis process into Steganographic to conceal secret messages. In contrast to

Sparse Encoded Matrix based Steganography algorithm
free download

Abstract-Image steganography is a field of steganography where images are used to hide information. Nowadays with the increasing lack of security online it is important to have means to make our data safe. In this paper we propose a method to increase the security of

A NOVEL METHOD FOR BLUETOOTH PAIRING USING STEGANOGRAPHY
free download

Abstract: There are two solutions in data security field for ensuring that only legitimate recipients will have access to the intended data: Steganography and cryptography. These solutions can be used for providing a high level of security. With the exponential growth of

Image Steganography and Data hiding in QR Code
free download

Abstract-Sometimes there is a need to keep our data safe and as at many places there is private data which needs to be secured. For this reason steganography is a technique which can be applied. Also we can add data in QR code for the ease of access of sending

A secure channel using social messaging for distributed low-entropy steganography
free download

Abstract Free, confidential and uncensored communication between two individuals is an essential requirement for the modern, digital age. Social communication and interaction between users of Online Social Networks (OSNs) enjoys certain security properties, but true

Chaotic Map Based Random Image Steganography Using LSB Technique.
free download

Abstract Steganography play an important role to transfer secret data over insecure network. Moreover digital images are taken as a cover to communicate the sensitive data. One of the simplest approach of embedding the secret data into cover image is Least Significant Bit

A Study of Steganography Based Data Hiding Techniques
free download

Abstract oday the exponential growth in internet users demand secure data communication, for that it is required to send the data in the form of encrypted or hidden form. Many information system security techniques are available. They are classified into

A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model
free download

ABSTRACT The objective of the present project is to uses a new techniques for steganography in a HSI color cover images, which hides secret message in the edges of the carrier images using 2-bit LSB substitution for embedding. To get true edges, canny edge

FPGA Implementation of Secret Data Sharing through Image by using LWT and LSB Steganography Technique
free download

Abstract: Security of information is very important in terms of communication and/or the secrecy of how to decode it. The enhancement of security system for secret data communication through encrypted data embedding in colour images is proposed. Initially

An Introduction to Steganography Techniques in the Field of Digital Image Processing
free download

Abstract: Steganography is the process of art and science in such a way that no one apart from sender and intended recipient even realizes that the communication is going on. It is also used to authenticate the digital images. Steganography is categorized into spatial

Image Steganography Based On Non Linear Chaotic Algorithm
free download

Abstract Late inquires about of picture steganography have been progressively in light of clamorous frameworks, yet the disadvantages of little key space and powerless security in one-dimensional disorderly cryptosystems are self-evident. This paper presents

Video Piracy Detection Based on Audio Steganography , AES and DNA Cryptography
free download

Abstract: Data transmission in public communication system is prone to the interception and improper manipulation by eavesdropper. Audio Steganography is the procedure of hiding the existence of secret information by zipping it into another medium such as audio file. This

A Study Paper on Video Based Steganography
free download

Abstract Steganography is the practice of hiding secret message or private information within other multimedia data ie text, image, audio or video. Recently video steganography has become privilege for providing large amount of data to be transferred secretly. Video is

Digital image security: Fusion of encryption, steganography and watermarking
free download

Abstract Digital images are widely communicated over the internet. The security of digital images is an essential and challenging task on shared communication channel. Various techniques are used to secure the digital image, such as encryption, steganography and

A Novel Algorithm for Enhancing the Data Storage Security in Cloud through Steganography
free download

Abstract The Cloud Computing is a dynamic term, which provides dispute free data outsourcing facility which prevent the user from burdens of local storage issues. However, security is perceived as a biggest issue and poses new challenges related to providing

Attribute Permutation Steganography Detection using Attribute Position Changes Count.
free download

Abstract: An approach to detecting the presence of HTML Attribute Permutation Steganography (APS) is proposed and founded on the idea of using a classification (prediction) model. To this end a position changes count metric, the Attribute Position

A Novel Secure Image Steganography Using Improved Logistic Map and DNA Techniques
free download

Abstract In this paper a secure steganography algorithm which is based on improved logistic map and DNA sequence is proposed. Canny edge detection is also utilized in this new scheme. The improved logistic map is more sensitive to initial condition than logistic map

Using Steganography for Secure Data Storage in Cloud Computing
free download

Abstract-Cloud computing is one of the popular method of accessing shared and dynamically configurable resources via the computer network on demand. The secure data storage on cloud environments is the primary requirement of such applications, where data

HYBRID APPROACH FOR IMPROVING DATA SECURITY AND SIZE REDUCTION IN IMAGE STEGANOGRAPHY
free download

Abstract Image steganography is used to hide the secret message under a cover image in order to enhance the security. There are several proposed techniques which are focused on the security issue in their work. In this paper, a new technique is presented, implemented

Image Steganography Based on AES Algorithm with Huffman Coding for Compressionon Grey Images
free download

Abstract: A secret message hidden inside an image, the images Encryption and Decryption using AES (Advance Encryption Standard) algorithm, LSB algorithm and compression and decompression of that image using Huffman Coding are proposed in this paper. The design

Steganography in VLC Systems
free download

Abstract: One of the areas in which wireless networks based on visible light communication (VLC) is considered superior to traditional radio-based communication is security. The common slogan summarizing VLC security features is WYSIWYS- What You See Is What

Image Quilting in Steganography using Reversible Texture Formation
free download

Abstract-It is an exclusive method or approach for a steganography , which is used for communication or sharing the private data with the help of multimedia carriers. There are many stenographic approaches available. The main goal of using stenography is to hide the

A Secret Image Sharing with Deep- steganography and Two-stage Authentication Based on Matrix Encoding.
free download

Abstract A secret image sharing with deep- steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Sus sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the

Compressed Sensing Based Image Steganography System for Secure Transmission of Audio Message with Enhanced Security
free download

Summary Research in information security and secrecy is becoming more and more important, as well as, demanding as the information is exponentially exploding. There has been a good bit of focus on cryptography, but with cryptanalysis and crypto attacks,

Text Steganography using Daily Emotions Monitoring
free download

Abstract Early in 2008, it was emphasized that sending messages through public networks will draw the attention of third parties such as attackers, perhaps causing attempts to break and reveal messages. Thus, cryptography was initially used to send a text message by

Use of Hybrid Fuzzy Neural Network for Advanced Steganography
free download

ABSTRACT In todays world steganography is very important due to the confidential communication between computer users over theinternet. Steganographyisknownastheapplicationofnon-visibletransmissionwhich is

A SURVEY ON IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION
free download

Abstract: Information security is one of the believable areas of research now-a-days. Steganography plays a shiny role in the information security. Its main aim is to covering sensitive information within a host such that the information existence remains confidential.

Cyrilic encryption based image Steganography algorithm
free download

Abstract-Image steganography is a field of steganography where images are used to hide information. Nowadays with the increasing lack of security online it is important to have means to make our data safe. In this paper we propose a method to increase the security of

A HYBRID TEXT STEGANOGRAPHY APPROACH UTILIZING UNICODE SPACE CHARACTERS AND ZERO-WIDTH CHARACTER
free download

Abstract: This paper presents a steganographic approach utilizing Unicode space and Zero Width Characters. The existing techniques are less robust, not sensitive against steg analysis and attain low hiding capacity. The proposed technique outperforms the limitations

Secure Online Voting using Steganography and Biometrics
free download

Abstract The fundamental knowledge beyond electronic voting system is to confirm integrity and reliability of specific mechanisms for addressing issues of security, privacy and accountability, which results due to the rapid development of information technology field

Analysis and Refinement of Steganography Techniques
free download

ABSTRACT Steganography is an art and technique of hiding data in some media ie image, audio or video file. For hiding data various steganography techniques are used. This paper is an effort to provide comprehensive comparison of these steganography techniques based

A Survey of Video Steganography Techniques
free download

Abstract Internet is the media due to which is possible to transfer data from one place to another place with very high speed. But it is very risky to transfer data over internet. Hence to maintain privacy and to prevent an unauthorized person from extracting information

Steganography Techniques
free download

Abstract steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In

SELECTED LEAST SIGNIFICANT BIT APPROACH FOR HIDING INFORMATION INSIDE COLOR IMAGE STEGANOGRAPHY BY USING MAGIC SQUARE
free download

Abstruct: The main goal of steganography is to hide the existence of any secret data from the eye of third party, so the resultant stego-image must appear normal and not suspicious after the impeding process. Stego-image must have an acceptable quality in comparison with its

A New Image Steganography Depending On Reference LSB
free download

Abstract Steganography is the science of hiding information using a digital media carrier in a way that prevents attackers and Intruders from revealing information and sharing it with others. Digital images are the most popular carrier for steganography . This paper presents a

Reliable Detection of LSB Steganography in Greyscale and Color Images
free download

Abstract Steganography is that the technique for activity secret data in different information likes still, transmission pictures, text, and audio. Whereas Steganography is that the reverse technique during which detection of the key data is finished within the stego image.

Image steganography for criminal cases
free download

Abstract-Crime scene investigators document everything they collect at a crime scene, keeping detailed records of what they found and in what position they found it. Maintaining documents secrecy is very important aspect otherwise forgery could happen. To help

Improved Security Based on Combined Encryption and Steganography Techniques
free download

From the earliest times participants to remote conversations felt the need to ensure the privacy and confidentiality of that conversation. Today, an immediate solution may consist in encrypting the conversation using more or less complicated encryption procedures. This

Audio Steganography for Secure Data Transmission
free download

Abstract As the internet growing day by day secure transmission of information is crucial. Steganography and cryptography both techniques provide data confidentiality, integrity and help us to protect data from day by day attacks. Internet communication has become an

Video Steganography Schema based on AES Algorithm and 2D Compressive Sensing
free download

ABSTRACT This paper proposes a novel reversible image data hiding (RIDH) scheme over encrypted domain. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the decoder side,

Data Encryption Based Image Steganography : A
free download

Abstract-The steganography system which uses an image as the cover, there are several techniques to conceal information inside cover-image (a) Spatial Domain and,(b) Frequency Domain. The spatial domain techniques manipulate the coverimage pixel bit values to

Digital Media Steganography
free download

Abstract-A new steganographic methodology mistreatment reversible texture synthesis is planned during this paper. A texture synthesis method resamples a smaller texture image that synthesizes a replacement texture image with an identical native look and absolute size.

Arabic Text Steganography Using Unicode of Non-Joined to Right Side Letters
free download

Abstract: Steganography is a technique for hiding data in media in a way that makes its existence hard to detect. Text files are a preferable format for use in steganography due to the small storage size of such files. This paper presents an Arabic text steganographic

QR Code Based Image Steganography
free download

Abstract: Image Steganography is the process of embedding secret data in images such that its existence cannot be detected by others apart from the sender and the receiver. The present work focuses on a combination of cryptography and steganography to secure the

Hybrid DCT-DWT Digital Image Steganography
free download

Proposed approach Embedding image is done by embedded is not detectable part of an image than other methods as shown in results. The Steganography process is done by embedding image in middle frequency coefficient set of the 3-level DWT transform of host

Steganography techniques.
free download

Abstract. As cryptography is the standard way of ensuring privacy, integrity and confidentiality of a public channel, steganography steps in to provide even stronger assumptions. Thus, in the case of cryptology, an attacker cannot obtain information about the

Practicing LSB Steganography in PCA Transform Field
free download

Abstract PCA conversion defines one main stream and two sub-streams for the color of homogenous areas. This subject has led to design some effective algorithms for the processing of colored images such as coloring, changing the color, compressing and

A Secured Video Steganography By Linear Feedback Shift Register Method
free download

Abstract In this paper, the secret message are directly hidden in an specific frame of the original video in a random order with the help of key values. This key values is generated by using linear feedback shift register method. Further to increase the security level by applying

Steganography using PVD Algorithm for Android Application
free download

Abstract Information or any message hiding process encrypting into digital media for the purpose of security. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the

Transfer of Data with Secured Methods like Image Elliptic Curve Cryptography and Steganography
free download

Abstract: Securing information is a testing issue in todays time. Remembering it we have proposed another procedure which is the mix of Elliptic Cryptography and picture Steganography improved with another safe component for era of another, hearty security

A Novel Video Steganography Algorithm for Secure Data Hiding
free download

Abstract-Unprecedented increase in the use of internet has made it possible for the person to send the information from one corner of the world to the another corner of the world. Not all the information is for all the people in the internet. Some of the information are very

Data Hiding Using Least Significant Bit Steganography in Digital Images
free download

Abstract Data hiding is the art of hiding data for various purposes such as to maintain private data, secure confidential data and so on. The network provides a method of communication to distribute information to the masses. With the growth of data communication over

Secure Image Steganography Algorithm Based on DCT with OTP Encryption
free download

Abstract-Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or

Data security using Steganography and Reversible Texture Synthesis
free download

ABSTRACT We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process takes the small unit of the texture image, that leads to a new texture image with a smaller portion of old texture and with arbitrary size. We weave

Empirical Evaluation Of Image Steganography
free download

Abstract: With the rapid development of digital multimedia and the web technology, the application of multimedia video, audio and image etc has been widely spread. As the application increases, the issue on the security of the copyright has been receiving more

Recent Advancement in Audio Steganography
free download

Abstract The information security is one of the most major problems in data communication. so it becomes an indivisible part of data communication. When we transfer data from one location to another location then we sure that data is safely transfer the perfect

A Robust Steganography for hiding Patient information in MRI images using Random Pattern LSB technique
free download

Abstract The hackers always remain the point to grab the chance to steal the important information to make money by selling it or when working for the spy or detective organizations. Hence the data embedding techniques becomes very important for the

VIDEO STEGANOGRAPHY
free download

Abstract Data abstraction techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications between different systems. The method of Steganography is used to share the data secretly and securely. It is

A New Approach for Combined DCT DWT Steganography Technique on Moving Image
free download

Abstract Steganography is those method with hiding data of the degree which nobody, but for those transmitter furthermore likewise those designated receiver, suspect those vicinity of the concealed information. Steganography is the art will hiding vital majority of the data

Packet Payload for Network Steganography
free download

Abstract-Cryptography, Steganography and Digital Watermarking are the three major techniques to protect sensitive data from unauthorized users. Cryptography and steganography are cousin brother and sister and are data hiding techniques. Digital

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES
free download

ABSTRACT: Pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values In decryption process the image and key are used For further protection both message stored and the key will be encrypted which can

Designing secured data using a combination of JPEG2000 Compression, RSA Encryption and DWT Steganography
free download

Abstract-The paper describes the combination of different method use to secure the data. The cryptography and steganography technique are used to secure the data. Cryptography technique is use to encrypt the data. Steganography technique is use to hide the data within

ASurvey ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
free download

ABSTRACT Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, a secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key

Steganography and Digital Watermarking as Promising Approaches to Information Hiding: A State-Of-The-Art Review
free download

Abstract; Since the invention of the Internet, the exchange of digital content has become much easier. One can send and receive such large data files as a text, video, audio, image data or other in the blink of an eye. On the one hand, the Internet has turned the concept of

Enhanced Image Steganography Using AES SPIHT Compression
free download

Abstract Steganography is derived from Greek word,steganos which refers to covered writing of messages. It is a mechanism of hiding messages or data by embedding them into some other data. Through this mechanism, the secured message can be completely hidden

Image Steganography Using Texture Synthesis Process
free download

Abstract-A steganography is a specialty of concealing secret information into computerized media, for example, picture, sound, video and so on. Here we are going to join the work of steganography alongside picture preparing. To do this a composition union procedure is

RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY : INCREASING ITS RESISTANCE TO STEGANALYSIS
free download

ABSTRACT 3D steganography is used in order to embed or hide information into 3D objects without causing visible or machine detectable modifications. In this paper we rethink about a high capacity 3D steganography based on the Hamiltonian path quantization, and increase

Data Leakage Detection of Video Files using LSB Steganography
free download

Abstract: Information security is the technique of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. Data leakage happens whenever a system reveals or disclosed some information to unauthorized

Data Hiding Using Steganography
free download

Abstract: With the spread of digital data across the world through the internet, the security of newline the data has raised a concern as data is the primary component of computer newline communication. For providing better security of the digital data, different data

IMAGE STEGANOGRAPHY USING 4LSB
free download

Abstract This technology proposes a lossless, a reversible, and a combined knowledge concealing schemes for ciphertext pictures encrypted by public key cryptosystems with probabilistic and holomorphic properties. Within the lossless theme, the ciphertext pixels

ENHANCED LSB ALGORITHM FOR IMAGE STEGANOGRAPHY
free download

Abstract: Steganography is used to transfer the data with image technique. Its easier to transfer data securely without modification. The concept using steganography introducing algorithm ENHANCED LSB ALGORITHM FOR IMAGE STEGANOGRAPHY . In

Efficient Security of Data By QR Code EncryptionSteganography
free download

Abstract QR Code (QUICK RESPONCE) are basically embedded with data that can be easily decoded, OR code have substantial role in mobile application like online payment, adhar card etc In every camera enabled smartphone can scan QR code. The QR code are

ZigBee Security Using Public Key Steganography
free download

ABSTRACT ZigBee an IEEE 802.15. 4 based specification is a low cost, low complexity and low power consumption wireless personal area network (WPAN) standard targeted at the wide development of long battery life devices in wireless control and monitoring

A Survey Paper on Data Hiding in Images using Image Steganography
free download

Abstract?In this paper, I will study the image- steganography and use of data hiding techniques in images. Secret data-hiding in images is more dissimilar than other formats. Image- Steganography is technique of hiding the secret data interested in a cover-object to

Steganography based Architecture for Reversible Texture Synthesis in Humanized Networks
free download

Abstract In the present computer era for information sharing in humanized networks where most of the consumers demands are growing very rapidly towards development of mobile based technologies where the mobile devices are portable and are becoming part of our

A NOVEL STRUCTURED-LEAST SIGNIFICANT BIT STEGANOGRAPHY
free download

Abstract The need for improved security in data communications has been the driving force behind the several types of research that describes various techniques for implementing security policies and systems. The use of Steganography and Cryptography has made a

A Case study on Steganography and its Attacks
free download

Abstract Steganographic systems work in many different ways to embed the secret data into the cover media. Digital steganographic techniques are limited in their ability to adequately adapt and respond to the increasing body of the steganographic techniques.

Cryptography and Steganography Usingdynamic Encryption
free download

Cryptography and Steganography techniques of digita are widely used to prevent and frustrate opponents from unauthorised access. There are many cryptograp steganographic methods which have been proposed. Mo them are simple techniques which can be broken by c analysis. However

A Secure Steganography Technique Using MSB
free download

Abstractteganography is the process of hiding secret message into a cover medium to conceal the existence of the message. The redundant nature of image pixels make them suitable medium to hide secret information. In this paper, a new improved technique that

Video Steganography Method Based DWT
free download

AH Mohsen, SH Shaker - ijs.scbaghdad.edu.iq Abstract The video steganography is a technique to hide information inside video file. Whereas video Steganography is a very important task in real life where the users want to keep data, so the steganography process used for the secure data transmission from the

Image Steganography Based on Hamming Code and Edge Detection
free download

Abstract: In this paper a novel algorithm which is based on hamming code and 2k correction is proposed. The new method also utilizes canny edge detection and coherent bit length. Firstly, canny edge detector is applied to detect the edge of cover image and only edge

Trends in Digital Video Steganography : A Survey
free download

ABSTRACT Steganography is the science of hiding data by embedding it in cover files without altering it. The cover media may be text, image, voice or video streams in a digitized format. Steganography is used to prevent unauthorized users from becoming aware of the

Vernam Encypted Text in End of File Hiding Steganography
free download

Abstract-The concealment of information in the image can be done with some specific techniques. One of the techniques used is End of File. In the insertion of this information, a series of characters will be converted to ASCII code and each byte will be inserted at the end

Raspbeery Pi Based Image-Audio Steganography for Data Security
free download

Abstract: Steganography is the method of hiding secret information like text, password, image and audio behind original cover file. In this paper we proposed an image and audio steganography using raspberry pi. In this system, our aim is to hide message behind the

Three Level Security Technique of Image Steganography with Digital Signature Framework
free download

Abstract Steganography technique is more popular in recent years due to high level security involved in transferring the data. In image stegnography scheme the secret message is hidden inside a digital image by using different techniques. Least significant bit

Linguistic Grammar Approach to Textual Steganography
free download

Abstract-Text Steganography is the technique of concealing secret or sensitive data within some text. Sending encrypted data risks drawing attention of hackers and crackers, where they might attempt to crack and reveal the original message. Steganography has gained

Hiding Secret Text inside a Dynamic Handwritten Signature as Steganography Application
free download

Abstract One of the defects with Cryptography is that, when an opponent sees the message in the encrypted form, they might suspect that the message might carry something important, therefore, they will try to roll back the encrypted form to its original one by using all possible

Providing Security to Online Shopping Using Credit Cards through Reversible Texture Synthesis in Steganography
free download

Abstract Due to the advancements made in the Information and Communication Technologies (ICT), security plays a major role in todays environment. Cryptography was created as a technique for securing the secrecy of communication and many different

A TQWT BASED APPROACH FOR IMAGE STEGANOGRAPHY
free download

Abstract: Image Steganography refers to the process of hiding digital data in the digital images in an imperceptible manner. There are mainly two types of Steganography : Spatial Domain and Transform Domain. This paper presents the study of Transform domain based

Ant Colony Optimization To Enhance Image Steganography
free download

Abstract Steganography is one of the most important mechanisms to protect the secret information over communication channels. Traditional image steganography approaches trend to hide secret message bits into image from first pixel and continue with other pixels

ANovel IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON SUPPORT VECTOR MACHINE CLASSIFIER
free download

ABSTRACT Steganography is the science of hidden data in the cover image without any updating of the cover image. The recent research of the steganography is significantly used to hide large amount of information within an image and/or audio files. This paper proposed

Digital image steganography using LSB substitution, PVD and EMD
free download

Abstract: To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganography techniques by appropriate combination of LSB substitution, pixel value differencing (PVD) and exploiting modification directions (EMD) has been

SECURITY FOR CLOUD COMPUTING USING STEGANOGRAPHY
free download

ABSTRACT: Cloud Computing is a flexible, rate-effective, and legitimate platform for all the industries or IT enabled customers offerings the services on the net. Nevertheless, cloud computing represents an added degree of threat on the grounds since most of the important

Audio Steganography Using Tone Insertion Technique
free download

Abstract: This paper presents a new technique of embedding text data into an audio file using tone insertion method. The new technique generates two frequency f1 and f2 and inserts them into audio file in a suitable power level according to specific table (stego-table).

MULTILEVEL NETWORK SECURITY SYSTEM COMBINING BOTH CRYPTOGRAPHY AND STEGANOGRAPHY ON ARM PLATFORM
free download

Abstract: This paper presents two level data security in Network system. Cryptographic algorithm BLOWFISH and Steganography algorithm List significant Bit (LSB) are used for data security. Confidential information is encrypted by BLOWFISH algorithm, and then

AN ILLUSTRATIVE REVIEW ON STEGANOGRAPHY TECHNIQUES USING QR CODE IMAGES
free download

ABSTRACT: This review paper concentrates on the concept of QR code steganography and its de-noising filters. The goal of this review paper is to explore and analyze QR Code generation, QR code versions, Steganography techniques and Problems of QR code. In this

Secured Biometric Signal Transfer using Steganography
free download

Abstract Biometric signals like images of Iris, figure print of the user, facial artifacts etc are being rapidly used in day to day activities today. With the implementation of the digital era, the idea of digital authentication for various purposes are in use for everyday activity. This

An Analytical Approach to an Implementation of Reversible Image Transformation with Steganography for an Online Document Leakage Detection and
free download

Abstract Steganography are the most popular or widely used information security scheme or techniques. It is the act of covert communications. The algorithms for hiding data or message in a cover image, and extracting a message from a stego-image were implemented using C#

Video Steganography By Using Discrete Wavelet Packet Transform: A Survey
free download

Abstract: The survey on video Steganography has been investigated over many years. As the world has moved to the digital era, the whole content of the living being has been uploaded to the server over internet. As the number of people using the internet is

A vulgarization article about steganography , illustrated by a simple demonstration of the vulnerability of the LSB substitution method
free download

Cryptography is the cornerstone of much of the internet. Cryptography allows to encrypt a message in such a way that, if performed correctly, onlylegitimateactors can decipher it in a reasonable amount of time. Hiding the meaning of a message has been a critical capability

FREE IEEE PAPERS
IEEE PROJECTS
GLASS CLIMBING ROBOT
GPS TRACKING SYSTEM
ROBOTICS ARMY
CLOUD SECURITY
SOLAR ENERGY
SECURITY SYSTEM

BIG DATA
CLOUD COMPUTING
IOT-INTERNET OF THINGS
ROBOTICS
CONTACT US





NEW IEEE PROJECTS