• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Journal of Applied Sciences
  2. Vol 14 (16), 2014
  3. 1798-1808
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Journal of Applied Sciences

Year: 2014 | Volume: 14 | Issue: 16 | Page No.: 1798-1808
DOI: 10.3923/jas.2014.1798.1808

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 254

Authors


M. Padmaa

Country: India

Y. Venkataramani

Country: India

Keywords


  • steganography
  • pixel indicator
  • information security
  • data hiding
  • Cryptography
Research Article

Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity

M. Padmaa and Y. Venkataramani
Steganography presents us with a secure means of data transfer which protects confidential information from unauthorized change. Putting it simple, it is a boon to prevent the unauthorized access or misuse of secret information. There are a lot of techniques (both spatial and transform domain) in Steganography. The question of “Which technique is the best” can only be answered hypothetically. Every steganographic technique is unique in its own way and produces desired result, that is, protection of information. The technique proposed in this study sheds light on capacity of embedding and high quality visual while being immune to steg analysis attack. Complexity is driven by means of stego key and LSB substitution.
PDF Fulltext XML References Citation

How to cite this article

M. Padmaa and Y. Venkataramani, 2014. Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity. Journal of Applied Sciences, 14: 1798-1808.

DOI: 10.3923/jas.2014.1798.1808

URL: https://scialert.net/abstract/?doi=jas.2014.1798.1808

Related Articles

Arabic Text Steganography using Kashida Extensions with Huffman Code
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Steganography-Time to Time: A Review

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved