A Study of Various Techniques and Methods of Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 269

Review Papers | Computer Science & Engineering | India | Volume 8 Issue 7, July 2019 | Popularity: 6.7 / 10


     

A Study of Various Techniques and Methods of Steganography

Harpreet Singh


Abstract: In order to secure delicate data, frequent and intensive internet transmission of data needs security methods. Steganography is one of many safety methods consisting of concealing data within a suitable multimedia (e. g. picture, video, audio. Steganography technologies such as capability (information size integrated) and imperceptibility (detectability level) face many difficulties. These two elements are inversely proportional to each other, resulting in a dilemma of data hiding. This article provides a review of the steganography techniques used in latest years and a critical assessment based primarily on measuring ability and, secondly, measuring imperceptibility and steganography.


Keywords: Steganography, ability, steganography characteristics, steganography types


Edition: Volume 8 Issue 7, July 2019


Pages: 1622 - 1625



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Harpreet Singh, "A Study of Various Techniques and Methods of Steganography", International Journal of Science and Research (IJSR), Volume 8 Issue 7, July 2019, pp. 1622-1625, https://www.ijsr.net/getabstract.php?paperid=ART20199954, DOI: https://www.doi.org/10.21275/ART20199954

Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article
Top