Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
User generally need to communicate data in the form of text, image, audio or video. Because of the increase used of internet, information is mostly communicated through the network. But in a network data is not secure, it can get eavesdrop. To protect data from the third person steganography technique can be used. Steganography means hiding secret information inside another data (cover data). Cover data can be text, image, video, audio or network protocol. Different method used for text, image, video and audio steganography are analyze in this paper.
Keywords: Data hiding, Least Significant Bit method LSB, image, video, text, audio, encryption
Edition: Volume 4 Issue 5, May 2015
Pages: 1537 - 1542
How to Cite this Article?
Amruta B. Bhojane, Priti A. Kodake, "A Survey on Steganography Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154468, Volume 4 Issue 5, May 2015, 1537 - 1542
102 PDF Views | 83 PDF Downloads
Similar Articles with Keyword 'Data hiding'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1642 - 1643A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
Shrutika S. Giradkar, Antara Bhattacharya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1976 - 1979Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method
Ekata S. Bele, Chetan Bawankar
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Similar Articles with Keyword 'image'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 165 - 167Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics
Nisha, Jatinder Kansal, JPS Raina
Similar Articles with Keyword 'video'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1384 - 1390Sherpa - Experts Social Network
Sangramsingh M Ghatage, Siddharth K Gaikwad
Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 85 - 88CBCD Methods in Video Copy Detection
Jan Mary Thomas
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 3170 - 3173Wireless Sensor Networks for Traffic Congestion Monitoring
Nitish R Chavan, Ravinarayana.B, Ravikumar.D
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Similar Articles with Keyword 'text'
Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021
Pages: 1165 - 1168A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features
Chengcheng Yan, Yanping Hu
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1789 - 1791The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence
Vina Lomte, Saloni Shah
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2205 - 2207A Survey of Generating Multi-Document Summarizations
Patil Ajita S., P. M. Mane
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 2310 - 2315Ruby on Rails IDEs and Text Editors: A Survey
Krishan Kumar, Sonal Dahiya, Ved Prakash
Similar Articles with Keyword 'audio'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1952 - 1955Ultra Wideband on High Speed Wireless Personal Area Networks
A. S. Syed Navaz, G. M. Kadhar Nawaz
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1910 - 1915An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting
Simarjeet Singh Bhatia, Rupali Bhartiya
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 988 - 991Filtering Unwanted Post from Online Social Networking (OSN) Sites
Sachin P. Vidhate, Syed Akhter
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1386 - 1389Congestion Control Protocols for Wireless Multimedia Sensor Networks
Snehal R. Ranesankpal, Manisha R. Dhage
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Similar Articles with Keyword 'encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe