1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jait@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

JPEG Compression Steganography & Crypography Using Image-Adaptation Technique

Meenu Kumari1, A. Khare1, 2 , and Pallavi Khare1, 2
1. BVUCOE/IT Dept, Pune, India
2. SSSIST/E&TC Dept, Bhopal, India
Abstract—In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for our research. In this paper, named “JPEG Compression Steganography & Cryptography using Image-Adaptation Technique”, we have designed a system that will allow an average user to securely transfer text messages by hiding them in a digital image file using the local characteristics within an image. This paper is a combination of steganography and encryption algorithms, which provides a strong backbone for its security. The proposed system not only hides large volume of data within an image, but also limits the perceivable distortion that might occur in an image while processing it. This software has an advantage over other information security software because the hidden text is in the form of images, which are not obvious text information carriers. The paper contains several challenges that make it interesting to develop. The central task is to research available steganography and encryption algorithms to pick the one the offer the best combination of strong encryption, usability and performance. The main advantage of this project is a simple, powerful and user-friendly GUI that plays a very large role in the success of the application.

Index Terms—Steganography, Cryptography, Compression, JPEG, DCT, Local Criteria, Image-Adaptation, Huffman coding, ET, SEC scheme

Cite: Meenu Kumari, A. Khare, and Pallavi Khare, "JPEG Compression Steganography & Crypography Using Image-Adaptation Technique," Journal of Advances in Information Technology, Vol. 1, No. 3, pp. 141-145, August, 2010.doi:10.4304/jait.1.3.141-145
Copyright © 2013-2019. JAIT. All Rights Reserved
Creative Commons LicenseThis work is licensed under a Creative Commons Attribution 3.0 Unported License.