Steganography Technique with Huffman Code

N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The growth of modern communication technologies imposes a particular means of security mechanisms in particular in case of data networks. In order to protect sensitive data while these are en route, applications call up different methods. Here we are trying to code the message by Huffman coding technique and applying the Steganography using differencing and substitution mechanisms with encryption to the original message which can give multi label security. Here we are trying to communicate in two phases such as (1) Encrypt the message by Huffman code and (2) applying the In Steganography. We divide the image into multiple blocks which are non-overlapped in nature and the block size is 3×3 pixel that will consider as matrix. For every value from the matrix can be represented in eight bit where two bit will use as least significant bit (LSB) substitution and quotient value differencing (QVD) is applied for other bits. We are trying to process in three levels: (i) Huffman tree through message is encrypted which is secret (ii) LSB substitution at lower bit planes and (iii) QVD at higher bit planes.

Cite

CITATION STYLE

APA

Steganography Technique with Huffman Code. (2019). International Journal of Recent Technology and Engineering, 8(2S4), 867–870. https://doi.org/10.35940/ijrte.b1173.0782s419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free