A Comparative Study On Some New Steganographic Techniques 

Abstract

In this paper, we present some new methods and develop techniques with algorithms for hiding text behind the gray scale image. Steganographic technique allows the sender to communicate information to the receiver without a third party even knowing that some communication is occurring. First, we embed a 512-bytes of text message in a 512 by 512 gray level image in each of the bit planes from first to eighth bit. We have also given some new techniques of embedding a text message in the entire gray level of the image itself, instead of bit levels, like hiding the text message in memory locations of image pixel values where the gray level is most repeated in column wise, row wise, abundant and odd abundant memory locations, equal / near equal to the gray level column wise, and entire image and at random locations. A comparison study is also carried out 

Authors and Affiliations

H. Faheem Ahmed , U. Rizwan

Keywords

Related Articles

BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs

Abstract—Causing packet loss due to attacks by malicious nodes is one of the most important problem in MANETs. There are many ways by which packet loss can occur in MANETs such as broken links, transmission errors, no ro...

A Countermeasure for Black Hole Attack in Mobile WiMAX Networks

Mobile WiMAX has drawn much attention due to its benefits. Nevertheless, security is a challenge and has to be ensured. The attacker may make use of parts of unencrypted management messages and acquire information about...

Design and Implementation of Floating Point Multiplier for Better Timing Performance  

IEEE Standard 754 floating point is the most common representation today for real numbers on computers. This paper gives a brief overview of IEEE floating point and its representation. This paper describes a sing...

Optimization of Throughput Using Multicast Routing in Wireless Mesh Networks

In the recent years the multicast routing in wireless mesh network has given attention on metrics to improve link quality and to increase the high-throughput.Nodes must have always contact with their neighbouring nodes t...

Implementation and optimisation of FPGA based network security system using VHDL  

The combination of traditional microprocessors and Field Programmable Gate Array(FPGAs) is developing as a future platform for intensive computational computing, combining thebest aspects of traditional microprocesso...

Download PDF file
  • EP ID EP146606
  • DOI -
  • Views 96
  • Downloads 0

How To Cite

H. Faheem Ahmed, U. Rizwan (2013). A Comparative Study On Some New Steganographic Techniques . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 390-398. https://europub.co.uk./articles/-A-146606