A Review on Various Approaches for Data Hiding
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

A Review on Various Approaches for Data Hiding

Sukhjinder Pal Kaur, Sonika Jindal

The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.

Keywords: image stegnography, RGB, Least Significant Bit, Intermediate Significant Bit

Edition: Volume 5 Issue 1, January 2016

Pages: 602 - 605

Share this Article

How to Cite this Article?

Sukhjinder Pal Kaur, Sonika Jindal, "A Review on Various Approaches for Data Hiding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152811, Volume 5 Issue 1, January 2016, 602 - 605

116 PDF Views | 108 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'image stegnography'

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 602 - 605

A Review on Various Approaches for Data Hiding

Sukhjinder Pal Kaur, Sonika Jindal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 408 - 412

A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach

Raminder Jit Singh Kahlon, Vinay Bhardwaj

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 293 - 297

A Comparative Study of Image Steganography Techniques

Shivani Kundra, Nishi Madaan

Share this Article

Similar Articles with Keyword 'RGB'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2161 - 2168

Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network

Anila R. Kurup

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 862 - 866

Survey on Content Based Image Retrieval

Mehak Garg, Jyoti Rani

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1968 - 1973

Face Recognition Revisited on Pose, Alignment, Color, Illumination and Expression-PyTen

Mugdha Tripathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1915 - 1919

Optimized Content Based Image Retrieval System using Colored Features with IWD

Damandeep Singh, Nitin Bhagat

Share this Article

Similar Articles with Keyword 'Least Significant Bit'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1172 - 1174

Survey on Digital Watermarking

Jyoti, Jyoti Rani

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article
Top