Abstract

Steganography is the science and art of secret communication between two parties that seek to conceal the content of their messages. It is a technology that embeds information into cover photos without losing information after embedding. Steganography is the technique and method of hiding a message so that no one but the sender and receiver will suspect how the message survived. This article compares two different techniques. The first technique uses the least significant bit (LSB) without encryption or compression. Now in the second method, the encrypted message is first encrypted and then the least significant bit is used. The image is then transformed into the frequency domain using a Discrete Cosine Transform (DCT). The LSB algorithm is applied in the local domain where the image parts corresponding to the payload are embedded in the least significant parts of the overlay image and the image is embedded in the least significant parts of the overlay image to generate a steganographic image. The DCT algorithm is appliedin the frequency domain and transforms from the steganographic image domain to the spatial domain where the image title is interpolated to the least significant parts of the image. This white paper mainly provides an overview of steganography requirements benefits and related technologies. This white paper shows which steganographic methods are most effective for which requirements are met and which applications are most compatible with which steganographic methods.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.