Data Security Using Data Hiding
For stenography we have used the least significant bit (4LSB) substitution method [2]. The 4LSB method is implemented for color bitmap images (24 bit and 8 bit i.e. 256 color palette images) and wave files as the carrier media. "The goal of stegnography is to hide messages inside other harmless...
Saved in:
Published in | International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) Vol. 4; pp. 247 - 251 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2007
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | For stenography we have used the least significant bit (4LSB) substitution method [2]. The 4LSB method is implemented for color bitmap images (24 bit and 8 bit i.e. 256 color palette images) and wave files as the carrier media. "The goal of stegnography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present. " By using this proposed algorithm, we can hide our file of any format in an image and audio file. We can then send the image via e-mail attachment or post it on the web site and anyone with knowledge that it contains secret information, and who is in possession of the encryption password, will be able to open the file, extract the secret information and decrypt it. |
---|---|
ISBN: | 0769530508 9780769530505 |
DOI: | 10.1109/ICCIMA.2007.163 |