scispace - formally typeset
Search or ask a question
Author

G.S. Gill

Bio: G.S. Gill is an academic researcher from Kurukshetra University. The author has contributed to research in topics: Steganography & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 1 citations.

Papers
More filters
Proceedings ArticleDOI
01 Feb 2020
TL;DR: Following work has been done using bit steganography in which bits of one image have been used which is called cover image to hide message image and results have been done on the basis of mean square error ad peak signal to noise ratio.
Abstract: Hidden communication is important since ancient times to provide the secrecy of information which may be for personal work or for professional work. In the ancient times cryptography was the main method for secret communication. In cryptography message is encrypted in some way but the existence of message is known to the third party which gives the possibility of hacking of the message by third party easily. Here comes the use of steganography which overcomes the drawback of cryptography. In steganography the existence of message is not known to the third party that makes it easy for two parties to communicate in an imperceptible manner. There are various techniques using steganography. Following work has been done using bit steganography in which bits of one image have been used which is called cover image to hide message image. This technique has been used on every bit of each pixel of cover image starting from LSB to MSB and then comparison of results has been done on the basis of mean square error ad peak signal to noise ratio.

2 citations


Cited by
More filters
Book ChapterDOI
01 Jan 2021
TL;DR: This chapter gives an overview of the different commonly used techniques in this area and the latest existing image steganography methods and the comparison of techniques.
Abstract: Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties. As data is unknown, it is challenging to attract the attention of any third parties. Therefore, steganography becomes the best and most secure method for data transmission. Digital images are the most common cover media or carriers in steganographic processes, where the secret payload is embedded into images. Several techniques are coming under image steganography, and there includes a different method to ensure the secrecy of messages. This chapter gives an overview of the different commonly used techniques in this area and the latest existing image steganography methods and the comparison of techniques.