Image Steganography With LSB 

Abstract

:The rapid development of data transfer through internet has made it easier to send the data accurate and faster to the destination, but in order to transfer the data securely to the destination without any modifications, there are many approaches like steganography. This paper introduces the concept of steganography using “ LSB METHOD”.  

Authors and Affiliations

Rahul Joshi , Lokesh Gagnani , Salony Pandey

Keywords

Related Articles

OPTIMAL LOCATION OF UPFC IN POWER SYSTEM USING SYSTEM LOSS SENSITIVITY INDEX 

This paper presents the development of simple and efficient models for suitable location of unified power flow controller (UPFC), with static point of view, for congestion management. Two different objectives h...

Trust in Cloud Computing

Cloud computing is the most recent technology in the Information technology industry which a lot of companies and government are putting much concern to make sure that they have benefited from this new innovation. Howeve...

A Survey on Preserving Privacy towards Location Proof 

Location proof of a particular person relies on his/her mobile device position. One of the valuable features of the location proofs tells about accessing the location based services (LBS) by using mobile device. Lo...

Computaional Complexity Analysis on Water Quality Index  

The computational algorithms are used to determine the features and applications from large data sets in real time environment. The computational applications are also used in environmental computing to evaluate th...

Disambiguation of User Queries in Search Engines 

With the increasing number of user queries to search engine. it has become necessary to study the area of Information Retrieval. User always expects to get the most appropriate and relevant results to the query. Bu...

Download PDF file
  • EP ID EP120568
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Rahul Joshi, Lokesh Gagnani, Salony Pandey (2013). Image Steganography With LSB . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(1), 228-229. https://europub.co.uk./articles/-A-120568