A STUDY ON OVERVIEW OF STEGANOGRAPHY WITH SPECIFIC TOOLS
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
t -Steganography is a science for invisible communication and play vital role on the network security. The security process is manipulated with the different tools and technology. The technology is provided secured environment to the network user via Least Significant Bit Insertion, Masking and Filtering Algorithm and Transformations. Using this technology many applications are developed to implement Steganography in the real time applications. This paper discussed the implementation procedure of available tool for encoding and decoding which covers all the data formats including Text, Image, Audio, and Video. All the tools and the implementation of online and off line implications are addressed along with the procedure.
Authors and Affiliations
A. Sankara Narayanan
The Blu-ray Disc Technology - An Optical Storage Medium
As technology becomes more advanced, the demand for compact disc units with a higher quality becomes greater. The thrust for an advanced format of data storage on optical disc led to revolutionary introduction of...
PIC CONTROLLER BASED PROCESS CONTROL SYSTEM USING GSM
: Devices with microcontroller are widely used in industrial field. We use network interface for connecting more than one device for parallel control. Here we present a design of PIC controller based embedded RS 48...
Analysis of Image Segmentation and Edge Detection in Medical Images
Accurate Image segmentation and edge detection are fundamental for Medical diagnosis, Locate tumours and other pathologies, Measure tissue volumes, computer-guided imaginary, Treatment Planning and Study of anatomi...
Energy Aware Architecture Using Spectrum Sensing Technique in Cognitive Radio Network
Cognitive radio (CR) is a novel concept that allows wireless systems to sense the environment, adapt, and learn from previous experience to improve the communication quality. The signal is detected by comparing the...
Price Adjustment for Double Auction Based Scheduling in Grid Environment
t— In Grid computing the resources are decentralized and dynamic in nature, managing the resources in such environment is a challenging task. Auction based scheduling is more attractive from the point of view of bu...