UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 2
February-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1802158


Registration ID:
180439

Page Number

910-915

Share This Article


Jetir RMS

Title

Data hiding in digital image: historical and current prospective

Abstract

Abstract—Steganography is the art that added, imparting mystery information in a proper medium transporter, e.g., picture, sound, and video files. It goes under the suspicion that if the element is noticeable, the intension of the assault is obvious; accordingly the motive is dependable to cover the very presence of the original information. Be that as it may, similar to some other science it can be utilized for sick expectations. In the steganography, information conceals in terms that cannot change the secret information. It’s mainly purpose is transferred data from one location to another location. It means concealed a secret data inside the other data in a manner that a critic cannot find the existence of real subject matters. Concealing the secret data in the images, various types of methods are used in which some are stronger than others to conceal the data. Steganography's definitive targets, which are imperceptibility, vigor (protection from different picture preparing strategies and pressure) and limit of the concealed information are the primary factors that differentiate it from related procedures, for example, watermarking and cryptography. This paper exhibited an overview of the real calculations of steganography conveyed in advanced imaging. The rising strategies, for example, DCT, DWT and versatile steganography are not very inclined to assaults, particularly when the concealed message is less. Steganography necessity is that the cover picture must be precisely chosen. A natural picture ought not to be utilized, it is better for stenographer to make their own particular pictures. There is some method of image steganography are discussed and these methods are different strong and weak points. In this paper, an overview is given of image steganography and its method.

Key Words

Keywords— steganography, interpolation, image security, data hiding

Cite This Article

"Data hiding in digital image: historical and current prospective ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 2, page no.910-915, February-2018, Available :http://www.jetir.org/papers/JETIR1802158.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Data hiding in digital image: historical and current prospective ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 2, page no. pp910-915, February-2018, Available at : http://www.jetir.org/papers/JETIR1802158.pdf

Publication Details

Published Paper ID: JETIR1802158
Registration ID: 180439
Published In: Volume 5 | Issue 2 | Year February-2018
DOI (Digital Object Identifier):
Page No: 910-915
Country: Rohtak, Haryana, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003030

Print This Page

Current Call For Paper

Jetir RMS