[PDF][PDF] A Novel Approaches Towards Steganography

GD Rote, AM Patil - International Journal of Technical Research and …, 2014 - academia.edu
For increase network security of messages sent on internet the steganography is mostly
preferred. To transmit data secretly steganography is used in open system environment. In …

[PDF][PDF] Techniques of steganography for securing information: A survey

S Bajpai, K Saxena - Int. J. Emerg. Technol, 2012 - researchgate.net
The main objective of writing this paper is to explore, as many as possible, algorithms and
techniques that have been used by many researchers to provide security to the information …

[PDF][PDF] Image steganography: A review

S Sharda, S Budhiraja - International Journal of Emerging …, 2013 - researchgate.net
Steganography can be defined as the study of invisible communication that usually deals
with the ways of hiding the existence of the communicated message. If it is achieved …

[引用][C] A review of digital image steganography techniques

SS Thakara, NL Bhale - International Journal of Advanced Research in …, 2014

[PDF][PDF] Secure Communication with Steganography—An Overview

A Rafiuddin, C Kumar - International Journal of Recent Research and …, 2014 - ijrrr.com
Steganography is the art and science of hiding information within other information in such a
way that it is hard or even impossible to tell that it is there. Many different carrier file formats …

[PDF][PDF] The Act of Steganography from Ancient Era to Digital Age

ND Jambhekar, CA Dhawale - International Journal of Computer …, 2015 - academia.edu
Digital data in the form of text, images, audio and video are transmitted over the internet by
means of communication links. The confidentiality of secret data should preserve from …

Overview: Main fundamentals for steganography

ZK Al-Ani, AA Zaidan, BB Zaidan, H Alanazi - arXiv preprint arXiv …, 2010 - arxiv.org
The rapid development of multimedia and internet allows for wide distribution of digital
media data. It becomes much easier to edit, modify and duplicate digital information …

[PDF][PDF] A survey paper on steganography techniques

RL Biradar, A Umashetty - High Impact Factor, 2016 - academia.edu
Steganography is going to gain its importance due to the exponential growth and secret
communication of potential computer users over the internet. It can also be defined as the …

[PDF][PDF] A Survey of Different Steganography Techniques

EA Elshazly, SAS Abdelwahab, RM Fikry… - Minufiya Journal of …, 2016 - researchgate.net
Steganography is defined as the art and science of embedding data in a cover object
without leaving a remarkable track on the cover object, in other words it is the study of …

[PDF][PDF] Review of different techniques used in recent steganography researches

JA Mazumder, K Hemachandran - International Journal of …, 2012 - academia.edu
As the network technology grows it is necessary to achieve the security of data during
communication through the network. In everyday life we use internet for sending our …