Downloads: 126 | Views: 283
Research Paper | Computer Science & Engineering | India | Volume 8 Issue 12, December 2019 | Popularity: 6.2 / 10
Security through Steganography - A Survey
Manu Narula, Chahat Goyal, Nikhil Sinha
Abstract: In today’s world, digitization has become a popular concept. However, it has also led to vast new ways of compromising privacy and accessing sensitive information giving rise to the need for high standard security in this field. Three major players surfaced in response to this problem; Cryptography, Water marking and Steganography. Steganography hides information in visual actions or media such as hand signs, visual Morse code, image pixels or frame pixels for streamed flow like videos, making it invisible to a wide variety of attacks as well as simple visual detection from humans making it almost impenetrable layer of security. Here we will be discussing the very roots of emergence of Steganography, their importance at their inception as well as their role in shaping the modern day landscape for data hiding schemes, along with the modern take and techniques in persuasion today.
Keywords: Steganography, Transform Domain, Spatial Domain, LSB, Quantization, Histogram
Edition: Volume 8 Issue 12, December 2019
Pages: 1796 - 1803
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1587 - 1589A Survey on Comparison between DCT and DWT Techniques of Image Compression
Pooja Rani, Apoorva Arora
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Downloads: 105
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2541 - 2544Reversible Data Embedding using F5 Algorithm
Sanjivani Koli, N. B. Pokale
Downloads: 106
Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015
Pages: 1367 - 1372Comparative Study for Steganography Techniques
Zainalabideen Abdual Samad Rasheed