Similar publications

Article
Full-text available
In all forms of confidential communication, the most significant element is security. Cryptography can be used to secure the information, but it discloses the presence of covert communication. Hence, steganography was invented; steganography is an art of concealed communication. Steganography is performed by inserting the secret information in a co...
Conference Paper
Full-text available
Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication between two parties. The image steganography is the technique of hiding the information inside the image.

Citations

... The key concept behind steganography [1,2] is that the message to be transmitted is hidden within another one (cover media) so that the presence of the hidden message is indiscernible and no one, other than the intended recipient, suspects the existence of the message. ...
... Steganography discipline differs from cryptography in that, while cryptography is the practice of developing and implementing algorithms of the encryption and decryption [4] of the stored or transmitted information, steganography is the discipline of embedding and transmitting messages in an invisible form so that there is no one other than the intended users can suspect the existence of the message. Steganography and steganalysis [1][2][3][4] are two contending consorts. Steganalysis is the discipline of challenging that is in endless confronting with the steganography methods. ...
Article
steganography is the discipline of exchanging information messages in such way that no one, other than the intended recipient, suspects the existence of the message. The transmitted message can be in textual or multimedia form (audio, image or video) and can be hidden within cover media. Moreover, the hidden message can be in either plain or cipher form. In steganography, the majority of hiding techniques are implemented either in spatial domain or in frequency domain of the cover media. The current contribution introduces a new a steganography technique for hiding a textual message within a cover image. Both the message and the cover image is converted to quaternion form and then only the quaternion message is converted to the frequency domain using Quaternion Fast Fourier Discrete Transform (QFFDT) technique. Simple quaternion mathematics are used to combine the message (in quaternion frequency domain) within the cover image (in quaternion form). Conversely, the hidden message can be revealed at the receiver using simple quaternion mathematics in presence of the original cover image. The proposed method allows hiding a huge amount of data and it is much complicated against steganalysis compared to the traditional methods. The method is assessed using the known performance metrics and the obtained results show that it is robust and more secure against steganalysis attacks without affecting the consumed bandwidth of the communication channel.
... So, steganography (hiding information) and cryptography (protecting information) are totally different from one another. Detecting procedure of steganography known as Steganalysis [3]. ...
Book
Full-text available
As its title suggests, this book covers certain areas of advances in science and technology. The contributions by the authors include Bio-fuels for Rural Electrification in which the writer has highlighted performance of a bio-fuel plant that runs on non-edible esterified Karanja vegetable oil and supplies electricity to far-flung and remote tribal village of Jharkhand state. In chapter Advances in Cloud Computing, its author has highlighted the cloud vision and cloud journey. The chapter Emerging Trends and Applications in Mobile Ad Hoc Networks presents the current state of the art of MANET and the problems and challenges related to routing, security, power management, location management and multimedia over an ad hoc networks. The author has investigated in detail about Ternary Chalcopyrite and found that ternary chalcopyrite is the most promising material of this century. Some of the authors have given an overview on Natural Language Processing, Threat to Vultures in Uttarakhand, Cracked Madhuca Indica (Mahua) Oil as a Diesel Engine Application. An Artificial Neural Network model has been designed by the authors for predicting the green sand moulding properties. Another Chapter highlight about Advances in Machine Learning. Few authors have highlighted the Progress in Global Oil and Gas Exploration and Recent study of carbon nanotubes and its application. Digital India is one of the important initiatives for the new technological world. One of the authors has highlighted the Digital India: Impact and Challenges on Rural India. Through their papers authors have highlighted about the Advances in Data Mining and Advances in Power Electronics. Few authors has given a review on Phytoplanktons in Eutrophic Water, Wetlands for wastewater treatment and management and Study of pigeon (Columba Livia) on the basis of special reference to Morpho Anatomy, Behavioural, Reproduction, Growth Development. Steganography is a better technique for concealing messages in another file format like text, image and videos. In chapter Design and implementation of Steganographic Method for Digital Images and Visual Cryptography, its author has highlighted a technique of data hiding using interpolation, least significant bit, digital watermarking and cryptography. In the chapter Demosaicking for Artificial Vision -Implementation and Evaluation the authors illustrated the perspectives in the designing of robotic system which is guided by the vision provided to it through camera. Using MATLAB for color recognition process and embedded coding for functionality of robot, the authors have designed and implemented a vision guided robot that identifies and follows the traffic signals which can be used for autonomous intelligent vehicles for the blind. The purpose of this book is to highlight the latest advances in science & technology. This edited book contains various materials. I hope this book would be helpful for students, researchers and academicians in the field of science and technology
Book
In this chapter, biofuel output from Madhuca indica oil that has high free fatty acid was reviewed. The reported oil was detected using heterogeneous catalysts as opposed to conventional transesterification method, because the latter improves the fuel properties better than the former. For diesel engine applications, the production of hydrocarbon fuel from Madhuca indica oil was characterized by the assessment of essential fuel Processing parameters. Hence attention was taken in the use of heterogeneous catalysts along with Coal Fly Ash (CFA) for the biofuels manufacturing process. It has been found from this review the performance results such as BTE for B25 blend indicate slightly lower sole fuel value at all loads and NOx emissions for B100 blend indicate substantially lower value than sole fuel. Smoke emissions for B25 demonstrate the upward trend of other blends. However, CO, HC emissions for B25 show small increases as compared to the sole fuel and B25 blend's combustion study showed nearly identical pattern in sole fuel.