Open Access Open Access  Restricted Access Subscription Access

Steganography Technique for Data Security

Kshitija S. Sawant, Shilvanti P. Reve, Ajinkya S. Shewale

Abstract


In today’s word it is very important to send the private information. Safely the rapid development of data transfer made it easier to send data faster to the destination. This paper includes the method of stenography through which we can transfer the data safely, the steps of image stenography and literature survey.

 



Full Text:

PDF

References


Mustafa Cem Kasapbasi* AND Wisam Elmasry “New Lsb-Based Colour Image Steganography Method To Enhance The Efficiency In Payload Capacity, Security And Integrity Check”. Dept of Computer Engineering, Istanbul Commerce University, Istabul, Turkey.

Alpa Agath*, Chintan Sidpara, Darshan Upadhyay “Critical Analysis of Cryptography and Steganography”. I.T. Deparment, V.V.P. Engineering Collage, Rajkot, Gujarat, India.

Arup Kumar Pal1, Kshiramani Naik1, and Rohit Agarwal2 “A Steganography Scheme On JPEG Compressed Cover Image With High Embedding Capacity”. 1Deparment of Computer Science and Engineering, Indian Institute of Technology(ISM), India, 2Deparment of Computer Science and Engineering, JSS Academy of Technical Education, India.

Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, and Palash Sarkar “Another Loop At Tightness II: Practical Issues In Cryptography”.


Refbacks

  • There are currently no refbacks.