0% found this document useful (0 votes)
37 views7 pages

Digital Media Steganography

https://irjet.net/archives/V4/i3/IRJET-V4I3702.pdf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views7 pages

Digital Media Steganography

https://irjet.net/archives/V4/i3/IRJET-V4I3702.pdf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

Digital Media Steganography


Siddhant Gaikhe1, Arjun Jadhav2, Ganesh Mortale3, Vikram Bhande4
Department of Computer Engineering,
Savitribai Phule Pune University, Pune , Maharashtra , India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A new steganographic methodology Most hand ways take over AN existing image as a
mistreatment reversible texture synthesis is planned canopy medium. once embedding secret messages into
during this paper. A texture synthesis method re- this cowl image, distortion of image could happens.
samples a smaller texture image that synthesizes a thanks to this reason 2 drawbacks occur .First, the
replacement texture image with an identical native dimensions of the quilt image is fastened, therefore a
look and absolute size. in conjunction with reversible lot of secret messages area unit embedded allow a lot
texture synthesis method, reserving area methodology of image distortion. thus to take care of image quality
is employed to infix extra information, that is that the it'll offer restricted embedding capability to any
highlight of this paper. Audio steganography is that the specific cowl image. Second,that image steganalysis
theme of concealing the info} in style of secret approach is employed to observe hidden messages
information by concealing it into another medium like within the stego image. This approach will defeat the
audio file. Video Steganography is to {cover} the image steganography and divulges that a hidden
existence of the message from unauthorized party message is being carried in a very stego image. This
mistreatment Video as cover file and concealing paper proposes a mixture of steganography and
information in video. during this paper a way planned texture synthesis method. the method of re-samples
is Hash primarily based least important bit technique alittle texture image drawn by associate degree creator
for video / Audio steganography. Least important Bit or captured in an exceedingly photograph so as to
insertion methodology infix information within the synthesize a replacement texture image, that have the
lower bits of RGB constituent of video and this changes same native look and absolute size is named texture
are nominal. synthesis. This paper combines the feel synthesis
Key Words: - Steganography, Reversible data hiding, method into steganography to hide secret messages
Texture synthesis, Reversible Data hiding. also because the supply texture. the key messages and
therefore the supply texture will be extracted from a
1.INTRODUCTION stego artificial texture.

In the most up-to-date decade varied advances are Given associate input video stream, video texture
created within the vary of computerised media, and far synthesis aims to come up with associate output video
concern has emerged with relevancy steganography for stream by conducting synthesis solely within the
computerised media. Steganography may be a solitary temporal domain, whereas dynamic texture synthesis
system for knowledge concealing ways. It implants aims to synthesize the input video stream in each the
messages into a number medium keeping in mind the spatial and temporal domains during this paper, we
top goal to hide mystery messages thus as to not excite tend to specialize in the video texture synthesis
suspicion by a unwelcome person. a standard drawback within the temporal domain, and gift.
steganographic application incorporates closemouthed activity the messages into digital sound/Video is
correspondences between 2 gatherings whose termed as audio/video Steganography. it's a tougher
presence is obscure to a conceivable assaulter and method than embedding messages in different media.
whose action depends on upon characteristic the Mistreatment audio steganography user will hide the
presence of this correspondence. once all is alleged in message in MP3/MP4. In coping with LSB
done, the host medium used as a region of cryptography methodologies (LSB) least important bit
steganography incorporates important advanced is changed to imbed information. In terms of part
media, as an example, computerised image, content, encryption theme, the part of carrier file is to get
sound, video, 3D model, and then forth. myriad replaced with the reference part that represents
steganographic calculations are researched with the hidden information. The signals area unit divided into
increasing ill fame and utilization of advanced photos.. regions in parity cryptography, then parity of every

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2777
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

region calculated and compared with secret message picture. The building blocks of the patch-based
bit. counting on the result encryption is completed. sampling algorithmic program square measure patches
of the input sample texture to construct the
synthesized texture. we will rigorously choose these
1.1 Problem Statement patches of the input sample texture and paste it into
the synthesized texture to avoid mismatching options
To Hide And Receive Secrete Information Using across patch boundaries. Patch-based sampling
Steganography In Digital Media Steganography . algorithmic program combines the statistic sampling
and patch pasting strengths .The texture patches
2. Literature survey within the sampling theme give implicit constraints to
J. Fridrich, M. Goljan, and R. Du projected a theme avoid garbage found in some textures. A. A. Efros and
for police work least important bit (LSB) non ordered W. T. freewoman planned a way for generates a brand
embedding in digital pictures. The length of secret new image by handicraft along little patches of existing
message springs by examine the lossless capability pictures. This method is thought as image quilting. it's
within the LSB and shifted LSB plane. the tactic in no time and straightforward texture synthesis
analyzing lossless information embedding capability algorithmic program. By extend this algorithmic
within the LSBs. Randomizing the LSBs within the program to perform texture transfer Operation In
decreasing order of lossless capability within the LSB patch-based texture synthesis procedure, outline the
Plane. Thus, the lossless capability accustomed live the cube of user-specified size from the set of all such
degree of randomisation of the LSB Plane. M. F. Cohen overlapping blocks within the input texture image. To
have accustomed implement associate degree synthesize a brand new texture image, allow us to
interactive application for texture style and synthesis. merely tile the blocks taken indiscriminately from the
Texture is a picture that has neighborhood and random input texture image. Next step is to introduce some
property. neighborhood suggests that little a part of the overlap within the placement of blocks onto the new
image is look alike and that they ne'er look precisely image. Now, search supply texture for such a block that
the same (Stochastic). to beat the memory agrees some live with its neighbors on the region of
consumption issues of enormous pictures , generates a overlap .At last, let the blocks have ragged edges which
method for coating little pictures to fill an outsized is able to enable them to raised approximate the
space. we frequently wants massive texture pictures. options within the texture. Then notice a minimum
So, we'd like to form massive image from little samples price path through that error surface and notice
.just coating the samples isn't a decent methodology. boundary of the new block.
Wang tile methodology is employed for tile the plane
with applicable samples supported matching Colours
Of Adjacent edges. Otori and Kuriyama projected the
key messages that square measure to be embedded are
often encoded within the style of dotted pattern and
that they are often painted on to a blank work table.
The remaining picture element values are often coated
victimisation picture element based mostly approach
therefore disguising the presence of coloured dotted
pattern. so as to extract the key message at the receiver
aspect before applying data-detecting mechanism
output of the stegno texture image is taken. The
embedding capability provided by the tactic of Otori
and Kuriyama is predicated on the quantity of the
coloured dotted patterns. L. Liang, C. Liu given
associate algorithmic program for synthesizing
textures from associate input sample. This patch based
sampling algorithmic program is incredibly quick and it
creates high-quality texture image. This algorithmic
program works well for a good selection textures likes
regular to random textures. is sampling patches
employing a statistic estimation of the native
conditional MRF density operate .Also avoid
mismatching options across patch boundaries of a

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2778
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

In past few decades the information transmission isn't expands the key message over the frequency spectrum
secure attributable to attacks by trespasser or of the audio file. because the outcome, the ultimate
aggressor. publically communication system signal takes a information measure that is quite what's
knowledge transmission isn't secure attributable to truly needed for transmission. Anyhow, the (SS) unfold
interception and improper manipulation by listener. Spectrum technique has one main con that it will
thus Steganography is that the engaging answer for this introduce noise into a audio file. In (SS) unfold
drawback, that may be a methodology of writing spectrum technique secret message is expand over the
hidden, messages except for the sender and receiver in audio signal's frequency spectrum the maximum
such the way that nobody, , suspects the existence of amount as potential. There ar varied steganographic
the message, a type of security through obscurity. strategies have been planned in literature. Video file
Audio steganography is that the theme of concealment hides an outsized quantity of secret information
the info} in type of secret information by concealing it therefore it's additional helpful. A secured Hash Based
into another medium like audio file. during this paper Mostly LSB technique for image steganography has
we have a tendency to square measure dealing been implemented.
differing kinds of audio handwriting ways, its
The basic demand of concealment a knowledge in cover
professionals and cons. To hide data secretly in the
file are going to be explained .The steganography is art
audio file there are few techniques introduced earlier.
of hiding information at intervals the video file or image
The lists of methods are: file. Steganography is a good suggests that of protective
the confidentiality of the data .The technique of
LSB Coding
knowledge concealment for top resolution video is
Phase Coding planned. It offer correct protection on information
throughout transmission. Hiding information
Parity Coding
victimization the motion Vector Technique for the
Spread Spectrum moving objects is introduced in.
LSB coding: In this compressed video is employed for the
In coping with LSB committal to writing methodologies information transmission since it can hold giant volume
of the information.The stego machine to develop a
(LSB) least vital bit is changed to engraft knowledge. In
terms of part coding theme the a part of carrier file is to steganographic application to cover information
get replaced with the reference part that represents containing text in a very pc video file and to retrieve the
hidden information is designed. This can be designed by
hidden knowledge. The signals square measure divided
into regions in parity committal to writing, then check embedding message come in a video come in such away
bit of every region calculated and compared with secret that the video doesn't loose its practicality victimization
message bit. counting on the result coding is completed. Least important Bit modification technique. The
Steganography is employed Or secure communication.
Phase coding High capability and Security Is obtained victimization
The supply sound signal (C) is metameric to induce the Steganography rule. A robust methodology of
header. The remaining half is to be jerky into smaller indiscernible audio, video, text and image concealment
segments that have lengths capable the dimensions of is proposed.
the message to be encoded. A (DFT) separate Fourier The motion vector technique is found because the
remodel is employed for every section to make a higher resolution since it hides the info in the moving
matrix of the phases. The embedded message is objects.The most secure and sturdy formula
inserted within the section vector of the initial signal
is introduced. Here a safer and effective hash-based
section as follows: Cons with this section secret writing
algorithm that uses a pure hash technique for writing
area unit an occasional knowledge transmission rate
thanks to that the key message is encoded within the and decoding the knowledge during a color image.An
1st signal section solely and to induce the key message improved LSB(least vital bit) primarily based
from the sound file, the receiver should apprehend the Steganography technique for images transmission
section length . higher info security. It presents associate degree
embedding formula for concealment encrypted
Spread spectrum messages in nonadjacent and random element locations
The formal (SS) unfold spectrum may be a technique to in edges and sleek areas of images.
unfold secret message across the frequency spectrum of A New Compressed Video Steganographic theme in
the audio signal. The (SS) unfold Spectrum technique which the info is hidden within the horizontal and also

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2779
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

the vertical components of the motion vectors is


proposed. There is system for knowledge concealment
uses AES for secret writing for generating secret hash
operate or key. A hash primarily based least significant
bit (LSB) technique has been planned. In which a special
domain technique wherever the key information is
embedded within the LSB of the duvet frames.

3.Related works:

Texture synthesis has received lots of attention


recently in laptop vision and special effects. the
foremost recent work has targeted on texture synthesis
by example, within which a supply texture image is re-
sampled victimization either pixel-based or patch-
based algorithms to provide a brand new synthesized
texture image with similar native look and whimsical
size. Pixel based algorithms generate the synthesized Steganography is that the technique of encrypting a
image constituent by constituent and use abstraction file, message, image, or video inside another file,
neighborhood comparisons to decide on the foremost message, image, or video. The word steganography
similar constituent in a very sample texture because may be a Greek words steganos, which means
the output constituent. Since every output constituent "covered, concealed, or protected", and graphene
is decided by the already synthesized pixels, any wrong which means "writing". Steganography is that the
synthesized pixels throughout the method influence methodology of covering and concealment messages in
the remainder of the result In flictin Gprop Agation of a very medium referred to as a cipher text.
errors. Steganography is said to cryptography. the essential
Patch-based algorithms paste patches from a supply plan behind cryptography is that you simply will keep a
texture rather than a constituent to synthesize message a secret by cryptography it in order that
textures. This approach of Cohen et al. and Xu et al. nobody will scan it. If a decent cipher is employed, it's
improves the image quality of pixelbased artificial possible that nobody, not even a government entity,
textures as a result of texture structures within the are going to be ready to scan it. this is often wherever
patches ar maintained. However, since patches ar steganography comes in. the aim of steganography is to
affixed with alittle overlapped region throughout the plant a message. All steganography needs may be a
artificial method, one must build an endeavor to make cipher text, that is wherever knowledge are going to be
sure that the patches consider their neighbors. hidden, a message that's created from knowledge,
Liang et al. introduced the patch-based sampling associate formula that decides steps to cover the info,
strategy and used the rotation approach for the and a key which will be wont to cypher the file. initial
overlapped areas of adjacent patches. Efros and citizen the info that's being passed from one person to a
gift a patch sewing approach known as image different is encrypted (not continually, however this is
quilting. for each new patch to be synthesized and often extremely suggested). Then the knowledge is
sewed, the rule 1st searches the supply texture and embedded into a cipher text. this is often done in line
chooses one candidate patch that satisfies the with the embedding formula and a secret key that
predefined error tolerance with regard to neighbors on performs the actions of the embedding method. This
the overlapped region. Next, a dynamic programming method outputs a steganogram that has the knowledge
technique is adopted to disclose the minimum error hidden within.
path through the overlapped region. This declares AN
optimum boundary between the chosen candidate Audio Steganography
patch and the synthesized patch, manufacturing
visually plausible patch sewing. Hiding the messages into digital sound is named as
audio Steganography. it's a tougher method than
embedding messages in alternative media.
victimization audio steganography user will hide the
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2780
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

message in MP3 like sound files. The Human sensory steganography have more activity capability (the
system (HAS) has the feature to urge exploited within quantity of data which will be embedded) that is
the method of Audio Steganography. sound perception usually a vital issue once developing a steganographic
uses vital band analysis within the labyrinth wherever algorithmic program.
a frequency to location transformation takes place on The second main advantage of activity knowledge into
the tissue layer. Received sounds power spectra isn't video file is that the additional security against the
drawn on a linear frequency scale however on attack of the third party or causeless receiver owing to
restricted frequency bands referred to as vital bands. relative quality of the structure of video as compared to
Video Steganography is to cover the existence of the image and audio.In video steganography technique
message from unauthorized party exploitation Video as least vital bit is straightforward technique to hide
cowl file and hiding knowledge in video. Steganography knowledge in video cowl file.In this technique from
means that lined writing itincludes method of video particular frames elect during which text can
concealing data at intervals alternative file and also embedded or hidded therein frames by victimization
conceals the actual fact that a secret message is being little bit of every of the Red, Green and Blue color
sent.In this paper a method projected is Hash based elements is used.This technique was to the brings
mostly least important bit technique for video simplicity in LSB insertion technique and additionally
steganography.Least important Bit insertion reduces the attacks from third party.The hash based
methodology enter knowledge within the lower bits of mostly LSB technique is completely different from LSB
RGBPel of video and this changes are going to be technique on basis of hash function because it takes
bottom.Data concealing is that the process of eight bits of secret knowledge at a time and conceal
embedding data in a very video while not ever- them in least vital little bit of RGB constituent.The
changing its sensory activity quality and conjointly chromatic influence of the blue color is a lot of to the
prevent from data of existence of message. A hash human eye than the red and inexperienced color
operate is employed to pick the position of insertion in thence three,3,2 order of distribution takesp lace.So
LSB bits.This technique deals with 2 terms that area random distribution of the bits takes place over
unit Peak Signal to Noise magnitude relation (PSNR) there.After activity data in multiple frames of a video
and also the Mean Square Error (MSE).Its objective is file,these frames square measure combined along to
to cut back MSE and increase PSNR. form a stego video and this video appear as if a
Steganography could be a quite art and science of standard video. licensed receiver perform the reverse
activity a secret message within the opposite digital method to decrypt the hiddenmessage or data.Stego
files as here we square measure victimization video file video are going to be broken into frames and so
that square measure in avi format.The video victimization the same word is applied to retrieve the
steganography uses a some frames of Video files to information. In this paper video steganography
implant the secret message. This steganography hides victimization hash based mostly LSB insertion
data in such the way that it seems like that no data is technique is developed in MATLAB.
hidden.Whenever any individual read that video during
which knowledge is hidden however they need no 4.Proposed System:
concept that any data won't be decoded by unwanted
person.Steganography offer security by obscurity.Video
Steganography technique won't only hide knowledge
however additionally hide the presence of
knowledge.The data is hidden even from receiver
however receiver will decrypt knowledge as they
understand the word that's accustomed implant
knowledge. The video file will hide lots of abundance of
data as a result of it carry large number of frames and
its storage capability is additionally a lot of. Video files
square measure larger than audio and image files, and
hide more data. The video steganography involve 2 In present system, the user sends data from one system
steps.The first step deals with embedding secret to the desired system in Local Area Network. 2.
message in the video files. The second step is that the Because of the security issues not only authorized
extraction of secret message from video files.This video persons but also unauthorized persons can view the
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2781
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

data. Here we will discuss the cons of the previous text are embedded among the video by victimization
techniques and in what way they are different with the steganographic tool.This stego video file is again
present method. There are mainly two cons associated applied to steganographic tool to decrypt embedded
of methods like parity coding. The human ear is very data.There is use of following rule for information
delicate and may detect the small noise which is activity. For video, a mix of sound and image
introduced in an audio file, though the parity coding techniques will be used. this is often as a result of the
method is somewhat closer to make the introduced very fact that video usually has separate inner files for
noise inaudible. Another con is robustness. One issue the video (consisting of the many images) and
which is associated with phase coding is a low data t therefore the sound. So techniques will be applied in
ransmission rate because of the fact that the hidden each areas to cover information. as a result of the scale
message is encoded in the first segment of signal. Phase of video files, the scope for adding uncountable
coding method is often used when small amount of information is way larger and so the probabilities of
data needs to be transmitted. Least significant bit (LSB) hidden information being detected is kind of low.
coding is the simplest technique to hide the data in an
audio file. By substituting the LSB of each sampling Algorithm for Encoding
point with a binary message, LSB coding ensures for a Step1: scan the input video wherever
large amount of data to be encoded and to be Steganography is processed during this video.
transmitted.This system will do the analysis and Step 2: Extract the image from the input video.
encrypt the secret message in cover media with the Step 3: Get input from the user during which
help of efficient algorithm. System we will be using frame user wishes to perform stegnography.
input and output buffer for encrypting and decrypting That input price considers as a public key.
our information. This system will provide a good and a Step 4: realize the smallest amount vital little bit of
efficient method for embedding the data from attackers the every component.
and sent safely to its destination. This proposed system Step 5: scan the key image.
will not make the change in the size of the file after Step 6: Replace the LSB price and substitute the key
encoding of data in an audio file. Encryption and image component.
Decryption techniques are used to make the security Step 7: Repeat the Step six till the last
in data transmission. component within the secret image to
be hidden.
Audio steganography algorithm Step 8: Regenerate all the photographs into
making Stego video.
Step 1 -Receives the audio file convert it into bit
pattern Algorithm for Decoding
Step 2 -Each character in the message is converted into
Step 1: browse the stego video.
bit pattern.
Step 2:authentication victimization public
Step 3 - Check which LSB to Replace By RC4 technique key of the receiver and apprehend
the worth is named the stego frame.
Step 4 - Replaces the LSB bit from audio with LSB bit Step 3: Calculate LSB of every pixels of stego-
from character in the message. image.
Step 4: Retrieve bits and convert every eight
A. Earlier numerous sorts of steganography bits into a personality.
techniques ar introduced for the video.Here we have a Step 5: Get the initial video.
tendency to projected the Hash primarily based Least
important Bit Technique for Video Steganography
which perform insertion of bits of document in video
within the least important bit position of RGB picture
element as per hash function.In this means it includes
secret writing and coding process for activity message
and extracting message respectively.In this technique
steganographic tool is developed in MATLAB computer
code that perform secret writing and coding.First of all

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2782
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

Watermarking International Journal of Computer


Applications (0975 8887) Volume 95 No.20, June
2014
[4] Y. Guo, G. Zhao, Z. Zhou, and M. Pietikinen, Video
texture synthesis with multi-frame LBP-TOP and
diffeomorphic growth model, IEEE Trans. Image
Process., vol. 22, no. 10, pp. 3879-3891, 2013.
[5] S.-C. Liu and W.-H. Tsai, Line-based cubism-like
imageA new type of art image and its application to
lossless
D
[6] Rachna Patel, Mukesh Patel,Steganography over
Video File by Hiding ata hiding, IEEE Trans. Inf.
Forensics Security, vol. 7, no. 5, pp. 14481458, Oct.
2012. Video in another Video File, Random Byte Hiding
and LSB Technique 2014 IEEE International
Conference on Computational Intelligence and
5. CONCLUSIONS Computing Research
One of the potential future works is to expand our [7] Masoud Nosrati Ronak Karimi Mehdi Hariri (2012)
planned theme rework work domain by mistreatment Audio Steganography: A Survey on Recent
remodel domain ways. each technique is also Approaches World Applied Programming, Vol (2), No
implemented merely, but if someone tries to go looking (3)
out out the tricks once knowing that someone [8] A. Efros and W. Freeman, Image quilting for
victimization the stego-video file, then there area unit texture synthesis and transfer,in Proc. ACM
sensibleprobabilities of searching for the hidden data. SIGGRAPH, 2001, pp. 341346.
thus on avoid this, the some hybrid system is used, in [9] Li Zhi, Sui Ai Fen,Detection of Random LSB Image
such the best method that even though someone finds SteganographyIEEE pp2113-2117,2004
out the one technique, it's used entirely on few frames [10] M. Varma and A. Zisserman, A statistical approach
and different frames contains utterly totally different to material classification using image patch examplars,
fairly steganography and thence total. secrete message IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 11,
is not delivered. SteganoSense tool is also extended to pp. 2032 2047, Nov. 2009
make it work on Video file format and different formats
like 3GP, AVI etc. At present, Wave audio files that area
unit of PCM audio format works with SteganoSense
tool. different audio formats want some form of
compression. this can be solved in future work. instead
of LSB, unfold Spectrum technique or section secret
writing technique is also used to insert secret message
bits. This application could bereborn to Mobile
Application

REFERENCES

[1] W. Kuo-Chen andW. Chung-Ming, Steganography


Using Reversible Texture Synthesis, IEEE Transactions
on Image Processing, pp. 1-10, 2014.
[2] P.R.Vignesh Kumar, Reversible Data Hiding Using
Texture Synthesis Approach2016 International
Conference on Circuit, Power and Computing
Technologies [ICCPCT]
[3] Shivani Khosla, Paramjeet Kaur, Secure Data
Hiding Technique Using Video Steganography and
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2783

You might also like