International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 126 | Views: 283

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 12, December 2019 | Popularity: 6.2 / 10


     

Security through Steganography - A Survey

Manu Narula, Chahat Goyal, Nikhil Sinha


Abstract: In today’s world, digitization has become a popular concept. However, it has also led to vast new ways of compromising privacy and accessing sensitive information giving rise to the need for high standard security in this field. Three major players surfaced in response to this problem; Cryptography, Water marking and Steganography. Steganography hides information in visual actions or media such as hand signs, visual Morse code, image pixels or frame pixels for streamed flow like videos, making it invisible to a wide variety of attacks as well as simple visual detection from humans making it almost impenetrable layer of security. Here we will be discussing the very roots of emergence of Steganography, their importance at their inception as well as their role in shaping the modern day landscape for data hiding schemes, along with the modern take and techniques in persuasion today.


Keywords: Steganography, Transform Domain, Spatial Domain, LSB, Quantization, Histogram


Edition: Volume 8 Issue 12, December 2019


Pages: 1796 - 1803



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Manu Narula, Chahat Goyal, Nikhil Sinha, "Security through Steganography - A Survey", International Journal of Science and Research (IJSR), Volume 8 Issue 12, December 2019, pp. 1796-1803, https://www.ijsr.net/getabstract.php?paperid=ART20203700, DOI: https://www.doi.org/10.21275/ART20203700



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article
Top