Text Embedded System using LSB Method ijtsrd
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data […]
Review Paper on LSB Based Stegnography to Enhance Image Security IJTSRD
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the […]
Comparative Analysis of Image Hiding Approach in Encrypted Domain Based on Histogram Shifting Method IJTSRD
In this paper we have used an efficient algorithm for hiding secret image also called payload in different types of cover image using histogram shifting method of reversible data hiding technique. Image utilized is jpeg, bmp and tiff images. We have analyzed this algorithm in MATLAB simulation tool. In this analysis we have calculated some […]
LSB Based Stegnography to Enhance the Security of an Image IJTSRD
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the […]
An Efficient Algorithm for Hiding Text in Encrypted Domain of Image using Histogram Shifting Method IJTSRD
In this paper we have proposed an efficient algorithm for hiding text in various images using histogram shifting method. In this algorithm we have found locations of maximum and minimum repeated pixels. Then location of maximum repeated pixels is considered and location of minimum repeated pixels is avoided. We have analyzed this algorithm in MATLAB […]