Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3211
Analytical Study of Spatial & Transform Domain Analysis of Image
Stenography Techniques
Gurmeet Kaur, Rasneet Kaur, Amanpreet Kaur , Harpreet Kaur
-------------------------------------------------------------------------------------------------------------------------------------
Abstract
Data security is a standout amongst the most vital elements to be viewed when mystery data hosts as imparted between two
gatherings. Cryptography and steganography are the two systems utilized for this reason. Cryptography scrambles the data,
however it uncovers the presence of the data. Steganography conceals the genuine presence of the data so that any other person
other than the sender and the beneficiary can't perceive the transmission. In steganography the mystery data to be imparted is
covered up in some other transporter such that the mystery data is undetectable. This paper gives a relative investigation of
various steganography strategies. At the point when the mystery data is covered up in the bearer the outcome is the stego flag.
The nature of the stego picture is measured by Peak Signal to Noise Ratio (PSNR), MSE
Introduction
Over numerous years data security is the greatest test for analysts. Since cryptography can't make anything undetectable, it is
swapped by steganography for concealed correspondence. Steganography conceals mystery data in different articles known as
cover items. Cover questions alongside the concealed data is known as stego protest. The cover can be a picture, sound or
video. The mystery can be instant message, picture or sound. In this paper the cover is a picture and mystery data is a sound
document. The steganography is accomplished in change area. There are basically two sorts of steganography procedures:
worldly area and change space. In worldly space, the real example qualities are controlled to conceal the mystery data. In
change space, the cover protest is changed over to various area, for example, recurrence area, to get the changed coefficients.
These coefficients are controlled to shroud the mystery data.
Fig -1: Information Hiding Techniques
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056