Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Level's 4 Security in Image Steganography

by Harpreet Kaur, Gaurav Deep
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 23
Year of Publication: 2015
Authors: Harpreet Kaur, Gaurav Deep
10.5120/21838-3893

Harpreet Kaur, Gaurav Deep . Level's 4 Security in Image Steganography. International Journal of Computer Applications. 121, 23 ( July 2015), 8-11. DOI=10.5120/21838-3893

@article{ 10.5120/21838-3893,
author = { Harpreet Kaur, Gaurav Deep },
title = { Level's 4 Security in Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 23 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number23/21838-3893/ },
doi = { 10.5120/21838-3893 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:11.401442+05:30
%A Harpreet Kaur
%A Gaurav Deep
%T Level's 4 Security in Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 23
%P 8-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography means secret writing of hide data in any others from of digital media . It may be Video,Audio, Text, Image, etc Data security is the requirement of digital media. Digital media to make it secure over a various techniques/Methods have been proposed by many researchers over decades. . To take step further we propose a new method in steganography . Which use RGB model in Image steganography. The proposed methodology is a combination of three techniques, Graph partitioning, clustering and pattern matching. These three techniques are used collectively to introduce a new technique which can be used in steganography, provide upper level of security and increase data hide capacity.

References
  1. Chamkor singh, Gaurav Deep, "Cluster Based Image Steganography Using Pattern Matching", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 2, Issue 4, July – August 2013.
  2. Deborah A. Whitiak, "The Art of Steganography".
  3. Shawn D. Dickman," An Overview of Steganography", JMUINFOSEC-TR-2007-002.
  4. Sanjeev Kumar and Jagvinder Kaur "Study and Analysis of Various Image SteganographyTechniques", IJCST Vol. 2, Issue 3, September 2011, ISSN: 2229 - 433
  5. Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav," Steganography Using Least Signicant Bit Algorithm", International Journal of Engineering.
  6. Arvind Kumar and Km. Pooja, "Steganography- A Data Hiding Technique", International Journal of Computer Applications (0975 – 8887) Volume 9–No. 7, November 2010
Index Terms

Computer Science
Information Sciences

Keywords

RGB Image RGB Color Model Steganography Graph partitioning Clustering Level's 4 security.