
Hemalatha ShivaramManipal Academy of Higher Education | MAHE · Department of Computer Science and Engineering
Hemalatha Shivaram
M.Tech
About
13
Publications
5,268
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
289
Citations
Citations since 2017
Publications
Publications (13)
Steganography is one of the techniques used for secure transmission of secret information. The secret information is concealed in a carrier and transmitted. Video steganography uses video signals to hide the secret information. The objective of this paper is to hide large volumes of secret data in video files. In the proposed technique, AVI video f...
Secret data when transmitted over the network must be protected from the illegal copy, modification or destruction by the malicious user. Audio steganography is a technique that provides a platform for secure transmission of secret data over the internet. In audio steganography, the secret data is transmitted with audio signal as the carrier. This...
Information security is one of the most important factors to be considered when secret information has to be communicated between two parties. Cryptography and steganography are the two techniques used for this purpose. Cryptography scrambles the information, but it reveals the existence of the information. Steganography hides the actual existence...
Information security is one of the main factors to be considered when internet is used for secret information transmission. Secret data transmitted over the network must be protected from malicious or conspicuous users. Steganography is one of the foremost and fast developing techniques currently used in network to send the secret data without bein...
This paper presents a parallel approach to improve the time complexity problem associated
with sequential algorithms. An image steganography algorithm in transform domain is
considered for implementation. Image steganography is a technique to hide secret message in
an image. With the parallel implementation, large message can be hidden in large ima...
Rapid increase in data transmission over internet results in emphasis on information security.
Audio steganography is used for secure transmission of secret data with audio signal as the
carrier. In the proposed method, cover audio file is transformed from space domain to wavelet
domain using lifting scheme, leading to secure data hiding. Text mess...
Steganography is one of the methods used for secret communication.
Steganography attempts to hide the existence of the information. The object
used to hide the secret information is called as cover object. Images are the
most popular cover objects used for steganography. Different techniques have to
be used for color image steganography and grey sc...
Steganography is the art and science of covert communication. The secret
information can be concealed in content such as image, audio, or video.
This paper provides a novel image steganography technique to hide both
image and key in color cover image using Discrete Wavelet Transform
(DWT) and Integer Wavelet Transform (IWT). There is no visual diff...
Steganography is the science of invisible communication. The purpose of
Steganography is to maintain secret communication between two parties.
The secret information can be concealed in content such as image, audio,
or video. This paper provides a novel image steganography technique to
hide multiple secret images and keys in color cover image using...
Steganography is the science of "invisible" communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image usi...
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and keyin color cover image using Discrete Wavelet Transform (DWT).There is no visual difference between the stego image and the...
This paper proposes a secure image steganography technique to hide a secret image using the key. The secret image itself is not hidden, instead a key is generated and the key is hidden in the cover image. Using the key the secret image can be extracted. Integer Wavelet Transform (IWT) is used to hide the key. So it is very secure and robust because...