A Comparative Result Analysis of Text Based SteganographicApproaches
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over thecommunication networks. But not withstanding with this advantage it also has a downside i.e. the digitized datacan be easily accessed illegally, it can be tampered with and copy. The issue of providing security to theinformation has become increasingly important with the development of computer and expanding its use indifferent areas of one's life and work[4]. One of the grounds discussed in information security is the exchange ofinformation through the cover media. In this, different methods such as cryptography, steganography, etc., havebeen used. Many approaches were introduced for making the data secure. But the efficient utilization of those approaches isn’t defined i.e. which approach to be used according to the situations. This paper implements fiveapproaches of Text Steganography to compare their Time and Space complexities by from considering threeText Steganography algorithms from the study of Monika Agarwal's paper entitled "Text SteganographicApproaches :A Comparison"[1] and bring out the comparative results of algorithm for some particular secrettext. The results of the comparisons are shown in form of bar charts and pie charts.
Authors and Affiliations
K. Aditya Kumar Prof. Suresh Pabboju
Iris Pattern Recognition
Abstract: The earlier experimental which were conducted has resulted in the biometric templates, which include the iris of human eye and the attributes of the individual, that are produced using different methods of reco...
Impact of Face Partitioning On Face Recognition Performance
Abstract: Face partitioning algorithm is presented in this paper. Face is first divided into face parts namely head, eye pair, left eye, right eye, mouth and nose. Instead of giving the entire face as input in testing an...
Web Server for Remote Monitoring and Control
Abstract: This paper presents an implementation of a platform independent embedded web server and itsintegration into a network of wireless sensor nodes. The embedded web server is designed and built as anexpansion...
An Efficient Approach for Requirement Traceability Integrated With Software Repository
Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since  ...
Modeling an Expert System for Diagnosis of Gestational Diabetes Mellitus Based On Risk Factors
Expert systems are recent product of artificial intelligence. It is a set of programs that manipulate encoded knowledge to solve problems in a specialized domain. Diabetes is a chronic illness that requires continuo...