Steganographic Secure Data Communication

被引:0
|
作者
Patil, Sangram Damodar [1 ]
Bhendwade, Pradip S. [1 ]
Patil, R. T. [1 ]
机构
[1] Shivaji Univ, Rajarambapu Inst Technol, Dept Elect & Telecommun, Kolhapur, Maharashtra, India
来源
2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP) | 2014年
关键词
Communication; LSB (Least Significant Bit); Steganography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like the internet. Steganography attempts to hide the very existence of the message and make communication undetectable. This paper is based on the implementation of steganography using LSB algorithm. The Least Significant Bit (LSB) embedding Technique that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden data in the cover file. The proposed system hide secret data into cover image using Two bit and three bit LSB algorithm and decoding using same algorithm.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2
    Yu, Jiang
    Zhou, Xiaoyi
    Si, Wen
    Li, Fengyong
    Liu, Cong
    Zhang, Xinpeng
    SYMMETRY-BASEL, 2023, 15 (05):
  • [42] VQ Applications in Steganographic Data Hiding Upon Multimedia Images
    Wang, Wei-Jen
    Huang, Cheng-Ta
    Wang, Shiuh-Jeng
    IEEE SYSTEMS JOURNAL, 2011, 5 (04): : 528 - 537
  • [43] Secure IoT Seed-based Matrix Key Generator A Novel Algorithm for Steganographic Security application
    Aine, Youssef Nour-El
    Leghris, Cherkaoui
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 1077 - 1086
  • [44] Design of image steganographic architecture using quantum-dot cellular automata for secure nanocommunication networks
    Debnath, Bikash
    Das, Jadav Chandra
    De, Debashis
    NANO COMMUNICATION NETWORKS, 2018, 15 : 41 - 58
  • [45] Provably Secure Covert Communication on Blockchain
    Partala, Juha
    CRYPTOGRAPHY, 2018, 2 (03) : 1 - 18
  • [46] Ultra-wideband (UWB) interferenceresistant system for secure radio communication with high data rate
    Immoreev, IJ
    Sudakov, AA
    1ST IEEE INTERNATIONAL CONFERENCE ON CIRCUITS AND SYSTEMS FOR COMMNICATIONS, PROCEEDINGS, 2002, : 230 - 233
  • [47] Camouflaging in Digital Image for Secure Communication
    Jindal B.
    Singh A.P.
    Journal of The Institution of Engineers (India): Series B, 2013, 94 (02) : 85 - 92
  • [48] A secure communication scheme for multiagent systems
    Wang, HX
    Varadharajan, V
    Zhang, Y
    MULTIAGENT PLATFORMS, 1999, 1599 : 174 - 185
  • [49] Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ
    Wang, Wei-Jen
    Huang, Cheng-Ta
    Tsuei, Shiau-Rung
    Wang, Shiuh-Jeng
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 599 - 612
  • [50] Duplicate File Names-A Novel Steganographic Data Hiding Technique
    Srinivasan, Avinash
    Wu, Jie
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 260 - +