IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

IMPLEMENTATION OF IMAGE STEGANOGRAPHY ON 32-BIT RISC PROCESSOR

AUTHORS:
Er.Praveen Veer
Er.Vinod Yadav
Mentor
Prof. Upendra Patil
Affiliation
Department of Electronics and Telecommunication / HOC College of Engineering / University of Mumbai, Rasayani Dist-Raigad,INDIA
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Modern digitization has resulted in versatility to eradicate the divergence among the types of information travel flanked by the users. It presents a pliable approach for the erratic block size selection in an impulsive mode to spice up the extent of sophistication within the stego algorithm. The plan of this work includes the elimination of key exchange for encoding and improving the safety to a large level without compromising the image quality and embedding capacity. The embedded hardware for stego implementations uses a picture carrier that creates soaring demand on memory, the extremely inhibited resource of embedded devices. The efficiency of the algorithm is to take care of image quality. Different applications are there for various requirements

Keywords
Article Metrics
Article Views
13
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Veer, E. & Yadav, E. (2026). Implementation of Image Steganography on 32-Bit RISC Processor. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.377

Veer, Er.Praveen, and Er.Vinod Yadav. "Implementation of Image Steganography on 32-Bit RISC Processor." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.377.

Veer, Er.Praveen, and Er.Vinod Yadav. "Implementation of Image Steganography on 32-Bit RISC Processor." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.377.

References
[1] Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci.,10:  1656-1661.

[2] Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J.

Inform. Technol., 5: 53-66

[3] Chan, C.K. and L.M. Cheng, 2004. Hiding data      in images by simple LSB substitution. Pattern Recognition., 37: 469-474

[4] Cheddad, Abbas, et al.” Digital image steganography: Survey and analysis of current methods.” Signal processing 90.3 (2010): 727-752.

[5] Mohd, Bassam J. Thaier Hayajneh, and Ahmad Nahar Quttoum.” Wavelet-transform steganography: Algorithm and hardware implementation.” International Journal of Electronic Security and Digital Forensics 5.3-4 (2013): 241-256.

[6] Zhenghao Shi and Lifeng He,” Application of Neural Networks in Medical Image Processing” Second International Symposium on Networking and Network Security (ISNNS 10).

[7] M.Vrhel E. Saber, and H.J. Trussell, “Color image generation and display technologies,” IEEE Signal Processing Mag., vol. 22, no. 1, pp. 23–33, Jan. 2005.

[8] K.N. Plataniotis and A.N. Venetsanopoulos, Color Image Processing and Applications. Heidelberg: Springer, 2000.

[9] Huang T. S., Schreiber, W. F., Tretiak, O. J. (1971). Image processing. Proceedings of the IEEE, 59(11), 1586–1609.

[10] J.M. Abrham, C. E. Catchpole, and G. W. Goodrich, “Image processing with a multiaperture, image dissector,” SPIE J., vol. 6, 1968, pp. 93-96.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
A Comparative Investigation of Knitted Fabrics Produced from Excess Yarn Cones and Mixed Yarn Counts
string(8) "Melvin P" P, M.
(2026)
DOI: 10.55041/ijsmt.v2i3.220
Chatbots and their Role in Customer Support Systems
string(20) "Ashneet Kaur Kochhar" Kochhar, A. K.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.088
AI-Enabled College Event Management Portal using QR-Based Attendance and Automated Certification
string(20) "Shrashti Vishwakarma" Vishwakarma, S.
(2026)
DOI: 10.55041/ijsmt.v2i5.286
Scroll to Top