International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 127

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016


A Review on Various Approaches for Data Hiding

Sukhjinder Pal Kaur | Sonika Jindal [2]


Abstract: The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text or even floppy disks) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.


Keywords: image stegnography, RGB, Least Significant Bit, Intermediate Significant Bit


Edition: Volume 5 Issue 1, January 2016,


Pages: 602 - 605


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sukhjinder Pal Kaur, Sonika Jindal, "A Review on Various Approaches for Data Hiding", International Journal of Science and Research (IJSR), Volume 5 Issue 1, January 2016, pp. 602-605, https://www.ijsr.net/get_abstract.php?paper_id=NOV152811

Similar Articles with Keyword 'image stegnography'

Downloads: 128

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 408 - 412

A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach

Raminder Jit Singh Kahlon | Vinay Bhardwaj [2]

Share this Article

Downloads: 152

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 293 - 297

A Comparative Study of Image Steganography Techniques

Shivani Kundra | Nishi Madaan [2]

Share this Article
Top