International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 127 | Views: 283

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.2 / 10


     

A Review on Various Approaches for Data Hiding

Sukhjinder Pal Kaur, Sonika Jindal


Abstract: The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text or even floppy disks) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.


Keywords: image stegnography, RGB, Least Significant Bit, Intermediate Significant Bit


Edition: Volume 5 Issue 1, January 2016


Pages: 602 - 605


DOI: https://www.doi.org/10.21275/NOV152811



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sukhjinder Pal Kaur, Sonika Jindal, "A Review on Various Approaches for Data Hiding", International Journal of Science and Research (IJSR), Volume 5 Issue 1, January 2016, pp. 602-605, https://www.ijsr.net/getabstract.php?paperid=NOV152811, DOI: https://www.doi.org/10.21275/NOV152811



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Downloads: 108

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article
Top