Research Article

Level's 4 Security in Image Steganography

by  Harpreet Kaur, Gaurav Deep
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Issue 23
Published: July 2015
Authors: Harpreet Kaur, Gaurav Deep
10.5120/21838-3893
PDF

Harpreet Kaur, Gaurav Deep . Level's 4 Security in Image Steganography. International Journal of Computer Applications. 121, 23 (July 2015), 8-11. DOI=10.5120/21838-3893

                        @article{ 10.5120/21838-3893,
                        author  = { Harpreet Kaur,Gaurav Deep },
                        title   = { Level's 4 Security in Image Steganography },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 121 },
                        number  = { 23 },
                        pages   = { 8-11 },
                        doi     = { 10.5120/21838-3893 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Harpreet Kaur
                        %A Gaurav Deep
                        %T Level's 4 Security in Image Steganography%T 
                        %J International Journal of Computer Applications
                        %V 121
                        %N 23
                        %P 8-11
                        %R 10.5120/21838-3893
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography means secret writing of hide data in any others from of digital media . It may be Video,Audio, Text, Image, etc Data security is the requirement of digital media. Digital media to make it secure over a various techniques/Methods have been proposed by many researchers over decades. . To take step further we propose a new method in steganography . Which use RGB model in Image steganography. The proposed methodology is a combination of three techniques, Graph partitioning, clustering and pattern matching. These three techniques are used collectively to introduce a new technique which can be used in steganography, provide upper level of security and increase data hide capacity.

References
  • Chamkor singh, Gaurav Deep, "Cluster Based Image Steganography Using Pattern Matching", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 2, Issue 4, July – August 2013.
  • Deborah A. Whitiak, "The Art of Steganography".
  • Shawn D. Dickman," An Overview of Steganography", JMUINFOSEC-TR-2007-002.
  • Sanjeev Kumar and Jagvinder Kaur "Study and Analysis of Various Image SteganographyTechniques", IJCST Vol. 2, Issue 3, September 2011, ISSN: 2229 - 433
  • Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav," Steganography Using Least Signicant Bit Algorithm", International Journal of Engineering.
  • Arvind Kumar and Km. Pooja, "Steganography- A Data Hiding Technique", International Journal of Computer Applications (0975 – 8887) Volume 9–No. 7, November 2010
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

RGB Image RGB Color Model Steganography Graph partitioning Clustering Level's 4 security.

Powered by PhDFocusTM