Different Aspects and Reviews on Steganography for Data Hiding
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
Security of confidential information has always been a major issue from the past times to the present time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver. Therefore from time to time researchers have developed many techniques.to fulfill secure transfer of data and steganography is one of them. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, text, video or audio, etc, and then transmitted secretly to the receiver The main aim in steganography is to hide the very existence of the message in the cover medium. Steganography and cryptography are counter parts in digital security. The obvious advantage of steganography over cryptography is that messages do not attract attention to themselves, to messengers, or to recipients. Also, the last decade has seen an exponential growth in the use of multimedia data over the Internet.These include Digital Images, Audio and Video files. This rise of digital content on the internet has further accelerated the research effort devoted to steganography.In the current work we are going to present the different aspects and reviews on stegnography , that has been completed and studied by different authors.
Authors and Affiliations
Sapna
A Secure and Adaptable Cloud Data Encryption System using cryptography: A Review
Security of data in cloud is one of the major issues which acts as an obstacle in the implementation of cloud computing. Cloud storage is an important part of cloud computing, which is used to achieve the target of stor...
Opportunities for Female Entrepreneurs in India
In today’s world, women entrepreneurs are playing very vital role and they have become important part of the global business environment and it’s really important for the sustained economic development and social progre...
An Improvement of Replication
Multi-processors must work,In this position paper, we disconfirm the understanding of the lookaside buffer. We disconfirm not only that 802.11 mesh networks and the memory bus are always incompatible, but that the same...
High Speed Low Power Self Timed CAM Application Based On Reordered Overlapped Search Method
This paper introduces a reordered overlapped search mechanism for high-throughput low-energy contentaddressable memories (CAMs). Most mismatches can be found by searching a few bits of a search word. To lower power diss...
slugExpression Recognition System for Images Processing Using Interval Type2 Fuzzy Modeling
face detection research confronts the full range of challenges found in general purpose, object class recognition. However, the class of faces also has very apparent regularities that are exploited by ma...