Review Papers | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016
A Review on Various Approaches for Data Hiding
Sukhjinder Pal Kaur, Sonika Jindal
The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
Keywords: image stegnography, RGB, Least Significant Bit, Intermediate Significant Bit
Edition: Volume 5 Issue 1, January 2016
Pages: 602 - 605
How to Cite this Article?
Sukhjinder Pal Kaur, Sonika Jindal, "A Review on Various Approaches for Data Hiding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152811, Volume 5 Issue 1, January 2016, 602 - 605
116 PDF Views | 108 PDF Downloads
Similar Articles with Keyword 'image stegnography'
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 602 - 605A Review on Various Approaches for Data Hiding
Sukhjinder Pal Kaur, Sonika Jindal
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 408 - 412A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach
Raminder Jit Singh Kahlon, Vinay Bhardwaj
Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 293 - 297A Comparative Study of Image Steganography Techniques
Shivani Kundra, Nishi Madaan
Similar Articles with Keyword 'RGB'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2161 - 2168Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network
Anila R. Kurup
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 862 - 866Survey on Content Based Image Retrieval
Mehak Garg, Jyoti Rani
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1968 - 1973Face Recognition Revisited on Pose, Alignment, Color, Illumination and Expression-PyTen
Mugdha Tripathi
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1915 - 1919Optimized Content Based Image Retrieval System using Colored Features with IWD
Damandeep Singh, Nitin Bhagat
Similar Articles with Keyword 'Least Significant Bit'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1172 - 1174Survey on Digital Watermarking
Jyoti, Jyoti Rani
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1367 - 1370A Review on Various Approaches of Video Steganography
Sapanpreet Kaur, Mandeep Kaur