Steganography for Confidential Communication and Secret Data storage

被引:0
|
作者
Chaudhary, Dev Kumar [1 ]
Srivastava, Sandeep [2 ]
Choudhury, Tanupriya [3 ]
机构
[1] Amity Univ UttarPradesh, Noida, India
[2] GL Bajaj Inst Technol & Management, Greater Noida, India
[3] UPES, Dehra Dun, Uttar Pradesh, India
关键词
Steganography; MATLAB; encoded image; image histogram;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [21. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [91. In this paper we have focused upon the use of images for the steganography technique.
引用
收藏
页码:461 / 465
页数:5
相关论文
共 50 条
  • [1] Image Steganography for Confidential Communication and Secured Data Storing
    Sivagurunathan, P. T.
    Archana, M.
    Shree, N. Durga
    Yuvashrie, G.
    [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 315 - 324
  • [2] Secret Communication Combining Cryptography and Steganography
    Chatterjee, Ayan
    Das, Asit Kumar
    [J]. PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 281 - 291
  • [3] Grey level modification steganography for secret communication
    Potdar, VM
    Chang, E
    [J]. 2004 2ND IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS: COLLABORATIVE AUTOMATION - ONE KEY FOR INTELLIGENT INDUSTRIAL ENVIRONMENTS, 2004, : 223 - 228
  • [4] Secret Communication using Public key Steganography
    Mishra, Madhusudhan
    Tiwari, Gangadhar
    Yadav, Arun Kumar
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [5] Secure Bit-Plane Based Steganography for Secret Communication
    Bui, Cong-Nguyen
    Lee, Hae-Yeoun
    Joo, Jeong-Chun
    Lee, Heung-Kyu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (01): : 79 - 86
  • [6] A Hybrid Approach for Video Steganography by Stretching the Secret Data
    Karthikeyan, B.
    Raj, M. M. Anishin
    Yuvaraj, D.
    Sundar, K. Joseph Abraham
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1081 - 1087
  • [7] Securing Data Through Steganography and Secret Sharing Schemes
    Rajput, Mohit
    Deshmukh, Maroti
    Nain, Neeta
    Ahmed, Mushtaq
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2018, 7 (05) : 40 - 45
  • [8] CONFIDENTIAL RECORDS ARE NO SECRET
    EDELMAN, S
    [J]. HOSPITALS, 1979, 53 (11): : 50 - 50
  • [9] Fusion: coalesced confidential storage and communication framework for the IoT
    Bagci, Ibrahim Ethem
    Raza, Shahid
    Roedig, Utz
    Voigt, Thiemo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2656 - 2673
  • [10] A STEGANOGRAPHY APPLICATION FOR SECURE DATA COMMUNICATION
    Baykara, Muhammet
    Das, Resul
    [J]. 2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2013, : 309 - 313