Security

A Comparative Analysis of Steganographic Data Hiding within Digital Images

Free registration required

Executive Summary

A huge deployment of effective steganography by several techniques with varying degrees of payload, peak signal to noise ratio (PSNR), robustness, perceptual transparency and so on has been evidenced. Steganography has been effective as an alternative to cryptography and has been projected to the forefront of digital security by the explosive growth in computational power, security awareness and through widespread intellectual pursuit. The current techniques for Steganography reviewed include substitution method such as least significant bit (LSB) and transform domain methods such as discrete cosine transform (DCT) and discrete wavelet transform (DWT). In this paper, the techniques involved with LSB, DCT and DWT are analyzed with the proper use of the performance metrics and then the techniques have been modeled by computer simulations.

  • Format: PDF
  • Size: 582.29 KB