steganography IEEE PAPER 2016





A new hybrid encryption and steganography technique: a survey
free download

Abstract Security in data communication is a very important concern today. It is used in almost every region like e-commerce, education, and industry and data warehouse. Securely sending and receiving data in the above area is an important as the data is

Sliced Images and Encryption Techniques in Steganography Using Multi Threading For Fast Retrieval
free download

Abstract The steganography is the process of hiding secret information within a message and extracting its destination image. The secured forms of steganography is implemented in image files. Encryption technique process is securing a data using mathematical concepts

A Comparative Study of Audio Steganography Techniques
free download

Abstract: The emerging growth in use of digital data recommended the need of effective measure to ensure security of digital data. The goal of steganography is to hide information by concealing it into some other medium like image, audio or video so that only sender

AnalysisEvaluation of Digital Audio Steganography
free download

Abstract Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files

DIGITAL DATA PROTECTION USING STEGANOGRAPHY.
free download

Abstract In today's digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy.

A Review of Digital Image Steganography using LSB and LSB Array
free download

Abstract Information exchange in the just about any cluster of computer has to be more secure in the era of cloud computing and big data. Steganography helps to prevent illegal attention through covering the secret message in a number of digitally electronically

Critical Analysis of Steganography An Art of Hidden Writing
free download

Abstract Steganography is the art of hiding information inside another medium while the presence of this embedding is invisible by human perception. In disparity to cryptography, steganography have a tendency to conceal the presence of the message or

Improved Steganography using Enhanced K Strange Points Clustering
free download

Abstract Steganography is an act of hiding information. It uses a cover medium to hide the secret information within itself. We perform the act of steganography using clustering. In this paper, we implemented the Enhanced K Strange Points Clustering Algorithm to achieve

A View on LSB Based Audio Steganography
free download

Abstract In this paper the concept of cryptography and steganography are combined to perform a powerful encryption. Here we propose a novel approach where a duel encryption methodology has been implemented. In the first level of encryption a pattern matching

EFFICIENT DATA HIDING SCHEME USING AUDIO STEGANOGRAPHY
free download

Abstract-Steganography is essentially a security system which is utilized to shroud the private or mystery information. This mystery information is inserted or hid in a manner that no other individual separated from the sender or beneficiary can seize it. Audio

Statistical Stegnalaysis for Content-Adaptive Steganography
free download

Abstract: Network is a group of two or more computer systems linked together. There are many types of computer networks, including the following: local-area networks (LANs), wide- area networks (WANS) metropolitan area networks (MANS). Network security consists of

A Fragmented Approach: Audio Steganography using Phase Coding and LSB
free download

Abstract Privacy has always been having a growing impact on the modern applications and the growth in terms of technology. Technical, commercial and legal regulations demand guarantees the highest to privacy to be provided whenever sensitive information is stored,

HIGHLY EFFICIENT IMAGE STEGANOGRAPHY USING HAAR DWT FOR HIDING MISCELLANEOUS DATA
free download

ABSTRACT Protecting private data exchanged over the Internet and controlling access to this data have become a growing privacy and confidentiality concern. Digital image steganography helps conceal private data within a cover image to obtain a new image,

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method
free download

Abstract:Steganography is nothing but the covered writing or secret writing. It is the science of secret communication. steganography is used to hide the survival of the message from unauthorized party. Images are the basic forms of transmitting information in the visual

COMPARATIVE STUDY OF EDGE BASED LSB MATCHING STEGANOGRAPHYFOR COLOR IMAGES
free download

Abstract Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of

An Infallible Method to Transfer Confidential Data using Delta Steganography.
free download

Abstract In the Steganography is secret writing or hiding fact that communication taking place, by hiding secret information inside image. The scope of project is implementation of steganography tools for information includes any type of information file and image file

Visual Cryptography and Steganography Techniques for Secure E-Payment System
free download

Abstract-In recent days there is rapid growth in online payment and E-Commerce market. Major factors that affects to customers in online shopping and payment are fraud in debit card or credit card and personal information security. personal Identity theft and phishing

Image Steganography, Compression and Image Morphing For Banking Website
free download

Abstract This paper present a application for enhancing security in internet banking. This paper mainly consists of image morphing, steganography and compression for security purpose. This proposal provides OTP security using image processing. The idea is to

Image Steganography: A Review
free download

Abstract: In the recent years, the security related to data over the internet has become a major issue. In order to solve the problem, two main techniques are used, first is cryptography and second is Steganography. Both are used for data security purpose.

A NOVEL FLV STEGANOGRAPHY APPROACH USING SECRET MESSAGE SEGMENTATION AND PACKETS REORDERING
free download

Abstract:-Steganography is not only the art of hiding the secret message in a cover media but also the existence of communication and secure data transferring. Today, there exist a lot of steganography techniques for building the secure data transferring communication

An approach of ECG Steganography to Secure the Patient's Confidential Information
free download

Abstract-The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient's privacy and security is important in the protection of healthcare privacy. It is utterly important that patient

Assured Data Communication Using Cryptography and Steganography
free download

Abstract:Now days in the world of communication, securing the information is Main criteria while communication in the network. Usually users exchange the confidential data and documents during communication. So, that Security is important criteria in Communication

A Hardware Approach to Digital Image Steganography using Black fin ADSP BF-532
free download

Abstract: Securing the Data over the wireless transmissions is the urgent need in the Data Communication field. The Protection of information over the wireless networks by encrypts the information but due to advancements in the computing techniques the cipher texts can

Applications of Steganography in Information Hiding
free download

A. Cryptography It is a technique for securing the confidentiality of communication. Many different encryption and decryption methods have been implemented to maintain the secrecy of the message, it may also be necessary to keep the existence of the message

Image Steganography on Second LSB
free download

Abstract This paper presents the Image steganography in second Least Significant Bit (LSB) in a grayscale and RGB image. In LSB based Steganography embed the text message or secret message in least significant bits of digital picture and in second LSB the text

Capacity Improved Arabic Text Steganography Technique Utilizing 'Kashida'with Whitespaces
free download

1 Capacity Improved Arabic Text Steganography Technique Utilizing 'Kashida' with Whitespaces 1Adnan Gutub Friday 5th February 2016 ICMSCE2016, Langkawi, Malaysia Steganography model Basic Steganography System Communication Channel Cover Object

Secured Wireless Communication Through Zigbee using Cryptography andSteganography
free download

Abstract Network security and protection of data have been of great concern and a subject of research over the years. There are many different forms of steganography mechanisms like LSB, Masking and filtering and Transform techniques. All of them have respective strong

A SurveyApplications of Various Image Steganography Techniques
free download

Abstract:Due to research is the ever-increasing need for harder-to-break encryption and decryption algorithms as the computer and network technologies evolve. We believe that by proposing the block-based encryption and decryption algorithm, it will help to reduce the

Implementation of Multi-Party Key Authentication and Steganography for Secured Data Transaction in Cloud
free download

ABSTRACT Cloud security is effective only if the correct defensive implementations are in place. Efficient cloud security architecture should recognize the issues that will arise with security management. Cloud providers either integrate the customer's identity

A Discrete Wavelet Transform Approach for Enhanced Security in ImageSteganography
free download

ABSTRACT The magnitude of the growth in the Internet combined with the increase in technological innovations pose serious threats to the process of digital data transmission. The government, military, small and large businesses and corporations, and individuals

A Brief study on Steganography techniques
free download

Abstract:As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many

A SECURE STEGANOGRAPHY APPROACH OF MULTIPLE SECRET IMAGES USING ANN
free download

Abstract: This paper proposes a modern steganography approach of embedding multiple secret colour images into a single cover image. According to proposed method each secret colour images are embedded in RGB planes of cover image respectively using artificial

Detection of Steganography using Metadata in Jpeg Files
free download

Abstract: Steganography is to conceal information in a carrier file or cover file. This is done to make secure communications without attracting attention of any other person except the sender and the receiver. This paper deals with digital steganography. The carrier file used

A Review on Audio Steganography
free download

Abstract: Steganography is the art of data hiding context of secret message, without the knowledge of third party. Audio steganography is to send secret audio file more securely. Various techniques has introduced for performing steganography along with the various

Steganography Algorithms for Image Security Using LSB Substitution Method
free download

Abstract: Steganography refers to information or a file that has been concealed inside a digital picture, video or audio file. The staggering growth in communication technology and usage of public domain channels (ie Internet) has greatly facilitated transfer of data.

A Simple Network Steganography Method based on the IPDs' Frequency Characteristic
free download

Abstract Network covert channel exploits the normal traffic as the carrier to transmit information secretly over the network. The existing covert timing channels have high security. However, they are sensitive to the jitters in the network. Thus, a new network

SECURE REMOTE AUTHENTICATION USING BIOMETRIC DATA WITHSTEGANOGRAPHY FOR WIRELESSNETWORK.
free download

ABSTRACT In wireless communications sensitive information is frequently exchanged, requiring remote authentication. Many authentication schemes using passwords and smart cards have been proposed. However, passwords might be forgotten and smart cards

Literature Review on Different WatermarkingSteganography
free download

Abstract-Now a days most of the people prefer to use internet to send data from one place to another across the world. The fast growth of Internet resulted into a major demand in transferring the information safe and accurate. However the information can be hacked

Performance Evaluation of Image Steganography using Hybrid Technique in Frequency Domain
free download

Abstract:Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. The major methodology for protection of some digital content is-Steganography. Image Steganography is a process where

Information Hiding Techniques: Watermarking, Steganography: A Review
free download

Abstract: Information hiding techniques have recently become important in a number of application areas. Now a day s digital communication has become an essential part of data transmission. Due to the increasing demand of various internet applications such as

An effective Image steganography using LSB Matching Revisited
free download

Abstract: The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number

SURVEY ON STEGANOGRAPHY TECHNIQUES USING TEXTURE SYNTHESIS
free download

ABSTRACT Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. To achieve more success rate many authors work around texture synthesis process

Evaluating Data Compression and Image Steganography Techniques for Optimized Embedding
free download

Abstract We investigate the performance of state of the art data compression techniques and steganography methods for digital images proposed in the literature. Data compression and hiding methods are tested against a number of well-known steganographic methods for

Digital Image Steganography based Security Model using wavelet for Internet voting Environment.
free download

Abstract:The growth of internet has increased the attention towards having an internet voting system which will give the facility to voter to vote online. The security and authentication are the major bottleneck in an internet voting system. Biometrics is a

A Solution to Cloud Security: Image Steganography
free download

Abstract: The paper focuses on characterization of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security, we move to brief description of steganography. In particular, we introduce classification of steganographic

A Review on Data Leakage Prevention using Image Steganography
free download

Abstract-In today's increasingly distributed environment most of the work done by exchanging information from one system to another via network. The confidential data needs to be distributed only between the distributor and the trusted third parties. The data sent by

Crypto-Steganography: An Information Security Tool for a Cloud Environment
free download

Abstract: With the rapid development of cloud technologies, more and more multimedia data (text, video, image, sound) are generated and transmitted in the medical, education, commercial, military and other private sectors, public communications, which may include

Enhanced Security Audio Steganography by Using Higher Least Significant Bit
free download

Abstract–Data hiding is an approach that conceals secret data into a carrier. Steganography is the art and science of storing information so that its existence is hidden. The goal of steganography is to communicate securely in a completely undetectable manner and

ADAPTIVE IMAGE STEGANOGRAPHY USING PIXEL INTENSITY DIFFERENCE
free download

Abstract:In this digital world the Internet has become so popular and billions of people are using it. On various platform, web applications as well as standalone applications there is a need of Internet. For this purpose various techniques like cryptography, data encryption/

Text Hiding In Multimedia By Huffman Encoding Algorithm UsingSteganography
free download

Abstract:Information hiding is a part of information Security. Steganography is a technique of information hiding that focuses on hiding the existence of secret messages. Image steganography is a process that hides the message into cover-image and

A survey on image based steganography framework to enhance quality of payload object
free download

Abstract:Numeric description of a two dimensional image is known as digital image. Steganography is an elderly technique of invisible communication. The past form of Steganography has been outline by the Chinese as the confidential message was written

An Improved LSB Based Steganography Technique for Grayscale and Color Images
free download

Abstract--This paper proposes an improved Least Significant Bit (LSB) based steganography technique in the spatial domain in that the secret information is hided in an image by altering small modifications in its pixels for imparting better information security.

AUDIO-VIDEO STEGANOGRAPHY USING FACE RECOGNITION TECHNIQUE FOR AUTHENTICATION
free download

Abstract-Steganography is a method of hiding any secret information like password, text, image and audio behind original cover file. In this paper we proposed the combination of image steganography and audio steganography with face recognition technology as a

Combinational Approach of Genetic Algorithm and Trained Auto Associative Neural Network for Image Steganography
free download

Abstract:Different digital media used by steganography to carry secrete information. This paper presents an algorithm to perform image steganography by combinational approach of genetic algorithm and trained auto associative neural network (TAANN). The proposed

An Enhanced Audio In Audio Hiding Model By Combining WatermarkingSteganography And Cryptography
free download

Abstract Today's increasing demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. Large number of

A Survey on Steganography Based Reversible Texture Synthesis
free download

Abstract:Steganography is a method for communicating secret data using appropriate multimedia carrier such as image, audio, and video files. Several stenographic methods are present. The objective of steganography is to hide information in such a way that

Analysis of Steganography with Various Bits of LSB for Color Images
free download

Abstract-The technique for hiding any information in other information is known as Steganography. According to the technique of Least Significant Bit encryption, secret message is embedded in the least significant bits of the cover image and identification of

Multilayered, High capacity, Distortionless Image Steganography using ANN
free download

Abstract In the midst of the progress in communication technology, most of the data used are available in internet and are in electronic form. Maintaining secrecy of data transmitted becomes a major issue. To provide information/data security, many techniques are

Steganography System using Slantlet Transform
free download

Abstract:An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression

Review on Speech and Audio Steganography Techniques
free download

Abstract-Audio and speech steganography is the method of hiding secret information in an audio or speech file. The audio file in which the secret information is hidden is known as audio cover. The sender embeds the secret message in the audio cover file using a key to

A Study on Spatial Domain and Transform Domain Steganography Techniques used in Image Hiding
free download

Abstract:Steganography is the art of hiding a secret message within a larger one in such a way that an observer cannot detect the presence of contents of the hidden message. The Steganography used to transport information from one place to other place through public

Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application
free download

Abstract: For secure data hiding and transmission over the wireless network Image steganography is a best technique. The best way used to propose system is achieved by Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with

MRI Medical Image and Steganography
free download

Abstract: In this paper we present the working and functions of Magnetic Resonance. MRIs are widely used in the medical field to show the inner parts of human body. MRI tells us about the defects in body. These medical records contain extremely sensitive information

A Survey on Image Steganography Techniques using Compression
free download

Abstract: Image steganography is one of the oldest and most famous secure data hiding technique. In this paper a survey is done on various techniques based on combination of Steganography and Image Compression along with focus on Image Compression

Data Hiding in Image and Video Streams using Dual Steganography
free download

Abstract In the course of the past decade, data hiding technologies had progressed from limited use to pervasive deployment. With the swift advancement of smart mobile devices, the need to protect valuable exclusive information has generated a surplus new methods

Secure RGB Image Steganography Based on Triple-A Algorithm and Pixel Intensity
free download

Abstract:Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, even perceives the existence of the hidden message. In this paper, the concept of RGB intensity properties is being

A Robust Image Steganography Technique Using Quantized Range Table And Local Area Pixel Value Differencing
free download

Abstract:Steganography is a way of hiding the information transmitting from sender to receiver and making the communication invisible. To enlarge the capacity of hidden secret information and to produce indistinguishable stego-image from original image with human

Secure Payment System using Steganography and Visual Cryptography
free download

Abstract-In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a

A Survey of Hindi Text Steganography
free download

Abstract:Steganography is an art of hiding secret message in an unsuspecting cover document. Over the many years many systems have been proposed for the same. With the advancement of technical know-how even the cover medium has under gone certain

A Lookup XOR Cryptography for High Capacity Least Significant BitSteganography
free download

ABSTRACT Security of information and optimal bandwidth utility has become major problem with growth in data communication over computer networks. Steganography and cryptography are two different data hiding techniques employed to solve this problem.

Reversible Texture Synthesis in Steganography
free download

Abstract-A steganography is an art of hiding confidential data into digital media such as image, audio, video etc. Here we are going to combine the work of steganography along with image processing. To do this a texture synthesis process is used which re-samples

A Review on Secure Video Steganography Technique using LSBMSB
free download

Abstract: Steganography is used for secure transmission of secret information by hiding information behind a cover object. Various types of steganography have been used for security of data. Text, audio, image and video steganography were utilized for different

Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices
free download

Abstract–Individuals and corporate establishments alike are faced with threat from malicious attacks and infringement of their privacy over the internet or while using mobile devices. For this reason, there is a need for an enhanced means of information detection.

Block Based Least Significant Bit Algorithm for Image Steganography
free download

Abstract:Steganography is the process of concealing information of any type, by using some cover medium. Image steganography is steganography done using an image as the cover medium. This algorithm takes the entire text as one block and based on an input'n'

Security Enhancement in Audio Steganography by Encryption Algorithm
free download

Abstract–Steganography is considered as method to protect the digital information. Present work explore steganography for audio signals ensures secure data transfer between the source and destination in terms of audio file of different formats and the application of

DATA SECURITY THROUGH QR CODE ENCRYPTION ANDSTEGANOGRAPHY
free download

Abstract The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for

High Level of Perceptibility and Security in Color Image Steganography
free download

Abstract:This paper proposes a new steganography technique to keep the quality of the cover image and increase the security. To improve the capacity of the amount of data to be embedded yields perceptible degradation of stego-image. The proposed research work is

High Secure Digital Image Steganography for the Secrete Communication
free download

Abstract: Highest state-of-the-art image steganographic approach focuses on concealing multiple secret images in a single 24-bit cover image using LSB substitution based image steganography. Steganography, the secret image is embedded in the cover image and

A NOVEL STEGANOGRAPHY USING HILL CIPHER AND MICROARRAY IMAGES
free download

ABSTRACT Most of the Internet users either satisfy or ignore the current security and privacy of communication over network transmission until their information are misused or stolen. On the other hand, the costs of storage space and computational speed are both significantly

Cryptography and Steganography Algorithm for Hiding Text in HTML Document
free download

Abstract:As we know, our internet is growing fast and rapidly. It is very essential to secure the information. In this paper, we use text steganography technique which uses HTML document as the cover medium to hide secret messages. We are using C#. net technology

Image Transmission Technique via Mosaic Image Steganography
free download

Abstract: A new secure image transmission technique is proposed, which transforms automatically a given large-volume secret image into a so-called secret-fragment-visible mosaic image of the same size. The mosaic image, which looks similar to an arbitrarily

Three Levels of Protection by using Cryptography and Steganography
free download

Abstract The proposed research provide a new idea to protect the data as the data protection currently is necessary in all fields that use the world wide web as knownforLife is in need to use networks, internet and especially password to enter the private sites social

Efficient Steganography in Encoded Video Streams using Motion Vector Difference
free download

Abstract Digital video sometimes are stored and processed in an encrypted format to maintain privacy and security. For the purpose of content notation, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted domain

A REVIEW OF IMAGE STEGANOGRAPHY BASED ON DISCRETE WAVELET TRANSFORM
free download

Image steganography is considered as method hiding information and secret communication of potentialcomputerusersovertheinternet. From the past time to present time security of confidential information is always an important issue. The main purpose of

video steganography



AUDIO-VIDEO STEGANOGRAPHY USING FACE RECOGNITION TECHNIQUE FOR AUTHENTICATION
free download

Abstract-Steganography is a method of hiding any secret information like password, text, image and audio behind original cover file. In this paper we proposed the combination of image steganography and audio steganography with face recognition technology as a

A Review on Secure Video Steganography Technique using LSBMSB
free download

Abstract: Steganography is used for secure transmission of secret information by hiding information behind a cover object. Various types of steganography have been used for security of data. Text, audio, image and video steganography were utilized for different

Data Hiding in Image and Video Streams using Dual Steganography
free download

communication. Videosteganography is an advanced technique which is used to hide any kind of files in any extension formats into a carrier video file.IV.CONCLUSION Videosteganography to hide text data in H.265/ HEVC video using the uncompressed Intra Pulse Code

CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER