To search, Click below search items.


All Published Papers Search Service


Analysis of Different Steganographic Algorithms for Secured Data Hiding


M.Umamaheswari, S.Sivasubramanian, S.Pandiarajan


Vol. 10  No. 8  pp. 154-160


The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we compress the secret message and encrypt it by the receiver’s public key along with the stego key and embed both messages in a carrier using an embedding algorithm. The stego - image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). It can be saved into BMP or PNG format. The reason that it can only be saved in these formats is because they are lossless - there is no information lost as part of the file formatting. The various applications of steganography include secure military communications, multimedia watermarking and fingerprinting applications for authentication purposed to curb the problem of digital piracy.


Steganography, Cryptography, Data Hiding, Steganographic algorithms