S Chaudhary, M Dave, A Sanghi… - Proceedings of the Second …, 2016 - dl.acm.org
Safety measures are the main issue while communication over digital networks, but no one can assure delivery of the right contents as burglars may on the way keeping an eye on the …
VL Narayana, NA Kumar - Ingénierie des Systèmes d' …, 2018 - search.ebscohost.com
English Steganography is helping individuals to send private information between two gatherings. It empowers client to conceal information in various advanced mediums …
A Tyagi, RV Singh, S Sharma - ResearchGate, Feb, 2020 - researchgate.net
Steganography is the method of hiding information or data in a very peculiar manner using cover objects and various techniques. In the last two decades the adaptability of the digital …
R Kumar, H Singh - Handbook of Computer Networks and Cyber Security …, 2020 - Springer
There have been pressing needs for securing a document and its content, either in electronic form or printed form. This is because counterfeiting and forgeries are extremely …
P Dobriyal, J Yadav, J Jain - Int. J. Res. Publication's, 2015 - Citeseer
With the rapid growth of networking mechanisms, where large amount of data can be transferred between users over different media, the necessity of secure systems to maintain …
A Malik - Proceedings of the International conference on …, 2021 - papers.ssrn.com
Today, in the digital world, all the things are available on internet. The main concern is about privacy and security due to which steganography has experienced a great concentration by …
S Dulera, D Jinwala, A Dasgupta - arXiv preprint arXiv:1203.3644, 2012 - arxiv.org
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders …
P Singh, R Chaudhary, A Agarwal - IOSR Journal of Computer …, 2012 - academia.edu
Steganography is the art and science of covered or hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an …
LY Por, TF Ang, B Delina - WSEAS transactions on computers, 2008 - researchgate.net
Sending encrypted messages frequently will draw the attention of third parties, ie crackers and hackers, perhaps causing attempts to break and reveal the original messages. In this …