We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Article:Info Hide ñ A Cluster Cover Approach

by R. Amirtharajan, Krishnendra Nathella, J Harish
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 5
Year of Publication: 2010
Authors: R. Amirtharajan, Krishnendra Nathella, J Harish
10.5120/730-1023

R. Amirtharajan, Krishnendra Nathella, J Harish . Article:Info Hide ñ A Cluster Cover Approach. International Journal of Computer Applications. 3, 5 ( June 2010), 11-18. DOI=10.5120/730-1023

@article{ 10.5120/730-1023,
author = { R. Amirtharajan, Krishnendra Nathella, J Harish },
title = { Article:Info Hide ñ A Cluster Cover Approach },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 5 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 11-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number5/730-1023/ },
doi = { 10.5120/730-1023 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:07.638710+05:30
%A R. Amirtharajan
%A Krishnendra Nathella
%A J Harish
%T Article:Info Hide ñ A Cluster Cover Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 5
%P 11-18
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In a highly digitalized world we live today, the data to be transmitted are confidential at times, and in such cases there are many malicious intruders who try to access this information. Steganography is one recent method to provide reliable security. Steganography is the science of embedding data into different covers such that the data embedded is imperceptible; the aim is to embed and deliver secret messages in digital objects without suspicion. The covers that can be used cover all forms of digital multimedia. This paper deals with “Multimedia Steganography” in the most common forms of multimedia- Image, Video and Audio.

References
Index Terms

Computer Science
Information Sciences

Keywords

Audio steganography LSB steganography Information hiding video steganography