Secured transmission of information over the unreliable wireless channel is a profound research work in the field of wireless communication. In spite of the availability of various algorithms and their implementations, yet there is a need for improved methods of transfer of information. Steganography is one such technique through which secured data transfer is made possible. By hiding the highly sensitive information in embedding inside the cover image, using image steganography information sharing is authenticated. In this work, the cover image is decomposed and proper sub image is chosen using discrete wavelet packet transform and the sensitive information is hidden at the transmitter section. The wireless channel behavior is mimicked by ...
AbstractInformation security is one of the most important factors to be considered when secret infor...
Along with the thriving advancements in internet facility and related technology domain, information...
In the field of Data Communication, security issues are the top priority.Cryptography and steganogra...
Abstract- In this world now a day, secure our information plays a vital role because, the unauthoriz...
Steganography is the art of hiding private or sensitive information within a carrier that for all in...
The Discrete Wavelet Transform is a relatively recent and computationally efficient technique in com...
Secret communication over network has captured the imagination of researchers for many years. Stegan...
Abstract: In this paper we propose a new steganography technique which embeds the secret messages in...
[[abstract]]In this paper we propose a new steganography technique which embeds the secret messages ...
[[abstract]]In this paper, we proposed a novel stegangraphy method utilizing the features obtained f...
Abstract-- The image steganography is known as a technique of hiding information in cover object suc...
Image steganography is a technique that is used to hide information. The information can be of vario...
With the rapid development of network technology, information security has become a mounting problem...
The information security has become one of the most significant problems in data communication. So i...
Steganography is the art and science of writing hidden messages in such a way that no one apart from...
AbstractInformation security is one of the most important factors to be considered when secret infor...
Along with the thriving advancements in internet facility and related technology domain, information...
In the field of Data Communication, security issues are the top priority.Cryptography and steganogra...
Abstract- In this world now a day, secure our information plays a vital role because, the unauthoriz...
Steganography is the art of hiding private or sensitive information within a carrier that for all in...
The Discrete Wavelet Transform is a relatively recent and computationally efficient technique in com...
Secret communication over network has captured the imagination of researchers for many years. Stegan...
Abstract: In this paper we propose a new steganography technique which embeds the secret messages in...
[[abstract]]In this paper we propose a new steganography technique which embeds the secret messages ...
[[abstract]]In this paper, we proposed a novel stegangraphy method utilizing the features obtained f...
Abstract-- The image steganography is known as a technique of hiding information in cover object suc...
Image steganography is a technique that is used to hide information. The information can be of vario...
With the rapid development of network technology, information security has become a mounting problem...
The information security has become one of the most significant problems in data communication. So i...
Steganography is the art and science of writing hidden messages in such a way that no one apart from...
AbstractInformation security is one of the most important factors to be considered when secret infor...
Along with the thriving advancements in internet facility and related technology domain, information...
In the field of Data Communication, security issues are the top priority.Cryptography and steganogra...