Authors: Sai Venkatesh Balasubramanian
Data hiding techniques are growing stronger day by day, and with even stronger detection techniques, a powerful way of hiding and retrieving data is the need of the hour. In this paper, we first discuss basic steganographic techniques in general and spread spectrum steganography in particular. Then we propose a steganographic method which hides data efficiently using Spread Spectrum techniques and also introduces Verification codes to check the integrity of the message at the receiver side. Finally, we look at the advantages of this system over others.
Comments: 5 Pages.
[v1] 2015-10-28 20:23:54
Unique-IP document downloads: 110 times
Vixra.org is a pre-print repository rather than a journal. Articles hosted may not yet have been verified by peer-review and should be treated as preliminary. In particular, anything that appears to include financial or legal advice or proposed medical treatments should be treated with due caution. Vixra.org will not be responsible for any consequences of actions that result from any form of use of any documents on this website.
Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful.