Abstract
Steganography is a technique which embeds the secret messages in the cover image and transmitted in such a way that the existence of information is undetectable. In this paper, we present a new technique that consists of two encoding algorithm such as Huffman encoding and bit inverting algorithm. In this technique, we proposed a modified secure and high capacity based steganography scheme of hiding a secret message such as text or image into a cover image. Our simulation results show that the algorithm has a good perceptual invisibility and high capacity in addition to be secure. Keywords: Bus Inverting, Discrete Wavelet Transform (DWT), Huffman Coding, Steganography, Wavelet.
Highlights
There have been considerable progresses in all domains of communications and technology nowadays
We proposed a modified secure and high capacity based steganography scheme of hiding a secret message such as text or image into a cover image
The information is obscurant in cryptography while the steganography attempts to hide the message existence that means the human eye can't distinguish the difference between the main media and stegoed one
Summary
There have been considerable progresses in all domains of communications and technology nowadays. The second algorithm is persistent enough for all types of attacks [2] Watermarking is another method similar to cryptography, which is used, for copyright preservation. The most important purpose is the recognition of copy right through watermarking [1], [3] Steganography refers to those algorithms, which hide the message inside a carrier media [2]. The information is obscurant in cryptography while the steganography attempts to hide the message existence that means the human eye can't distinguish the difference between the main media and stegoed one. The steganography system can be useful provided that had prepared a method for invisible information embedding and the hidden messages must be meaningful after extraction. In spatial domain the message embedded directly without any changes or transformation in the hidden and carried data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of Advanced Computer Science & Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.