Downloads: 127 | Views: 283
Review Papers | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.2 / 10
A Review on Various Approaches for Data Hiding
Sukhjinder Pal Kaur, Sonika Jindal
Abstract: The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text or even floppy disks) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
Keywords: image stegnography, RGB, Least Significant Bit, Intermediate Significant Bit
Edition: Volume 5 Issue 1, January 2016
Pages: 602 - 605
DOI: https://www.doi.org/10.21275/NOV152811
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Downloads: 108
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1367 - 1370A Review on Various Approaches of Video Steganography
Sapanpreet Kaur, Mandeep Kaur
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja