Steganography for Confidential Communication and Secret Data storage

被引:0
|
作者
Chaudhary, Dev Kumar [1 ]
Srivastava, Sandeep [2 ]
Choudhury, Tanupriya [3 ]
机构
[1] Amity Univ UttarPradesh, Noida, India
[2] GL Bajaj Inst Technol & Management, Greater Noida, India
[3] UPES, Dehra Dun, Uttar Pradesh, India
关键词
Steganography; MATLAB; encoded image; image histogram;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [21. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [91. In this paper we have focused upon the use of images for the steganography technique.
引用
收藏
页码:461 / 465
页数:5
相关论文
共 50 条
  • [21] Secret data transmission using advance steganography and image compression
    Pandey, Digvijay
    Wairya, Subodh
    Mandawi, Raghda Salam Ai
    Najim, Saif Al-din M.
    Khalaf, Haitham Abbas
    Al-Barzinji, Shokhan M.
    Obaid, Ahmed J.
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1243 - 1257
  • [22] Dual Steganography Approach for Secure Data Communication
    Sakthisudhan, K.
    Prabhu, P.
    Thangaraj, P.
    Marimuthu, C. M.
    [J]. INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 412 - 417
  • [23] Reversible Steganography: Data Hiding for Covert Storage
    Zhang, Zhuo
    Zhang, Weiming
    [J]. 2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 753 - 756
  • [24] Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data
    Agarwal, Parth
    Moudgil, Dhruve
    Priya, S.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 155 - 166
  • [25] Codo: Confidential Data Storage for Wireless Sensor Networks
    Bagci, Ibrahim Ethem
    Pourmirza, Mohammad Reza
    Raza, Shahid
    Roedig, Utz
    Voigt, Thiemo
    [J]. 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [26] Secure Storage and Processing of Confidential Data on Public Clouds
    Meizner, Jan
    Bubak, Marian
    Malawski, Maciej
    Nowakowski, Piotr
    [J]. PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 272 - 282
  • [27] Image steganography for securing secret data using hybrid hiding model
    Sumeet Kaur
    Savina Bansal
    Rakesh Kumar Bansal
    [J]. Multimedia Tools and Applications, 2021, 80 : 7749 - 7769
  • [28] Randomly Hiding Secret Data using Dynamic Programming for Image Steganography
    Khandelwal, Pulkit
    Bisht, Neha
    Thanikaiselvan, V
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 777 - 783
  • [29] Image steganography for securing secret data using hybrid hiding model
    Kaur, Sumeet
    Bansal, Savina
    Bansal, Rakesh Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) : 7749 - 7769
  • [30] Confidential communication and privileged communication
    Geijsbeek, John B.
    [J]. JOURNAL OF ACCOUNTANCY, 1911, 12 (05): : 361 - 373