{"title":"使用LSB隐写术的不同图像格式的比较","authors":"H. Kaur, Ajay Kakkar","doi":"10.1109/ISPCC.2017.8269657","DOIUrl":null,"url":null,"abstract":"Nowadays secure and safe transmission of data is a very important aspect for all internet users. In the data securing process the use of encryption algorithms almost make it very difficult for an eavesdropper to get access to the user's data. It helps to ensure the privacy of a company/user from others. Keeping in view the importance of steganography for secure data transmission this work incorporates the use of LSB substitution method. Simulation results show the feasibility of the proposed method. The data has been successfully embedded into different formats of images without any perceptible distortion in the image.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Comparison of different image formats using LSB Steganography\",\"authors\":\"H. Kaur, Ajay Kakkar\",\"doi\":\"10.1109/ISPCC.2017.8269657\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays secure and safe transmission of data is a very important aspect for all internet users. In the data securing process the use of encryption algorithms almost make it very difficult for an eavesdropper to get access to the user's data. It helps to ensure the privacy of a company/user from others. Keeping in view the importance of steganography for secure data transmission this work incorporates the use of LSB substitution method. Simulation results show the feasibility of the proposed method. The data has been successfully embedded into different formats of images without any perceptible distortion in the image.\",\"PeriodicalId\":142166,\"journal\":{\"name\":\"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPCC.2017.8269657\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCC.2017.8269657","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of different image formats using LSB Steganography
Nowadays secure and safe transmission of data is a very important aspect for all internet users. In the data securing process the use of encryption algorithms almost make it very difficult for an eavesdropper to get access to the user's data. It helps to ensure the privacy of a company/user from others. Keeping in view the importance of steganography for secure data transmission this work incorporates the use of LSB substitution method. Simulation results show the feasibility of the proposed method. The data has been successfully embedded into different formats of images without any perceptible distortion in the image.