functional and non functional requirements of image steganography
#1
Rainbow 

functional and non functional requirements of image steganography
Reply
#2

functional and non functional requirements of image steganography

Abstract

Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science it can be used for ill intentions. It has been propelled to the forefront of current security techniques by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: functional report of stock exchange method and methodology, non functional requirement of online movie ticket system, marketing interface qith other functional areas ppt free download, functional programming in haskell ppt, hardware and software requirements for image steganography, functional strength training for speed, multi functional wind mill,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  image encryption and decryption using rsa algorithm in matlab 2 7,911 29-05-2017, 04:17 PM
Last Post: Priyanka Bidikar
  download liver tumor ct scan image in matlab with source code 4 8,068 21-05-2017, 09:54 PM
Last Post: abdulrahmanmashaal
Thumbs Up online catering management system on php with report and source code and ppt 4 8,804 29-04-2017, 10:59 AM
Last Post: jaseela123d
Thumbs Up source code of online payment system using steganography and visual cryptography 3 8,511 06-04-2017, 09:56 AM
Last Post: jaseela123d
  f5 algorithm steganography matlab code 2 869 04-10-2016, 03:00 AM
Last Post: [email protected]
  color image segmentation using jseg algorithm in matlab code 2 866 29-09-2016, 12:07 PM
Last Post: Guest
  functional and nonfunctional requirements of online railway reservation system 2 975 21-09-2016, 03:55 PM
Last Post: hornybaboon
  solved examples on audio steganography using genetic algorithm 2 628 21-07-2016, 03:12 PM
Last Post: dhanabhagya
Wink difference between contributor and non contributor ppt 2 866 21-07-2016, 12:51 PM
Last Post: visalakshik
  how to hack mtn network and free airtime and data 2 1,307 16-07-2016, 04:17 PM
Last Post: jaseela123d

Forum Jump: