Analysis of Data Hiding Methods in Image Steganography

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Cloud Computing has evolved into a major technology in recent days to serve its customers in many ways. The shared pool of resources with configuration requirement needed by the customer is provided in an elegant manner. Data sharing is one of the important activities in cloud environment which requires confidentiality, integrity, authentication and nonrepudiation principles to provide data security. Providing the security and maintaining integrity of the data while it is being transferred through public channels is a challenging task. This paper attempts to answer that challenge by securing the data through image steganography. It is a modified LSB image steganographic technique using a password to hide data in an image. An analysis is performed for the techniques used and the number of characters hidden in the image.

Original languageEnglish
Title of host publication2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2023-2027
Number of pages5
ISBN (Electronic)9781538653142
DOIs
Publication statusPublished - 30-11-2018
Event7th International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018 - Bangalore, India
Duration: 19-09-201822-09-2018

Publication series

Name2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018

Conference

Conference7th International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018
Country/TerritoryIndia
CityBangalore
Period19-09-1822-09-18

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Analysis of Data Hiding Methods in Image Steganography'. Together they form a unique fingerprint.

Cite this