Downloads: 114 | Views: 269
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.3 / 10
An Efficient Technique of Steganography
Latika, Yogita Gulati
Abstract: This paper presents a Steganography Technique that uses DES (Data Encryption Algorithm), to encipher and decipher the blocks of data, which is based on symmetric key algorithm that uses a 56 bit key. By applying this algorithm we have developed an application that helps the user to hide their secret or a confidential data. Along with it we have used a compression technique that will increase the storage capacity.
Keywords: Steganography, DES Data Encryption Standard, Cryptography, conceal system, extraction, embedding, symmetric key, encryption, decryption, cipher text, symmetric key
Edition: Volume 4 Issue 6, June 2015
Pages: 842 - 846
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2205 - 2207A Survey of Generating Multi-Document Summarizations
Patil Ajita S., P. M. Mane