Abstract
The computer users have to safeguard the information which they are handling. An information hiding algorithm has to make sure that such information is undecipherable since it may have some sensitive information. This paper proposes a steganography method that conceals the message behind the image by providing the security when compared to the other existing methods. In this system, the information to be hidden is encrypted by an advanced cryptography technique. For that, initially, the data is divided by the method of arithmetic division. The information is hold on within the style of the divisor, the quotient & the remainder. The secret key is also encrypted and holds on several pixels. Then, the pixel matching algorithm is used to hide the information of the secret image in the carrier image. By this system, the embedding time is reduced when compared to different existing algorithms. In this method, different types of images are used for testing the proposed algorithm. By using this method, the peak signal to noise magnitude relation obtained is more for all the pixels present in the image.
Highlights
Steganography is the science of computing that hides the secret data inside a carrier image
Image steganography is most often associated with information hiding which includes the process of hiding important information in a secret image
Image steganography works on all types of information present in an image to hide it into another image
Summary
Steganography is the science of computing that hides the secret data inside a carrier image. Image steganography is most often associated with information hiding which includes the process of hiding important information in a secret image This can be sometimes done by the replacement of pixels that is necessary bits of data which is present inside the carrier image, [11] where the Cryptographic methodology separates the message into different parts. Audio and Video Steganography are the other two types of techniques that can be a used to hide any information into a hidden video or audio file [12]. Authors in [4] Proposes the secret data is encrypted using fuzzy technique to increase the hidden robustness
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.