[引用][C] A comparative study of image steganography techniques

S Kundra, N Madaan - International Journal of Science and Research (IJSR) …, 2014

[引用][C] Image Steganography

R Joshi, L Gagnani, S Pandey - Int. J. Latest Engineering. Mangement Reaserch, 2013

[PDF][PDF] Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm

PS Dutta, S Chakraborty - International Journal of Scientific …, 2020 - academia.edu
Steganography is data hidden within data. Steganography is an encryption technique that
can be used along with cryptography as an extra-secure method in which to protect data …

[PDF][PDF] Comparison of various images steganography techniques

K Kanzariya Nitin, V Nimavat Ashish - International Journal of …, 2013 - academia.edu
Data hiding techniques have taken important role with the rapid growth of intensive transfer
of multimedia content and secret communications. Steganography is the art of hiding …

Study of Various Techniques of Steganography and Steganalysis.

GN Sarage - International Journal of Advanced Research in …, 2014 - search.ebscohost.com
Steganography and steganalysis are important tools that allows transmission of information
over and over communications channel. The purpose of steganographic communication is …

[PDF][PDF] Techniques of steganography for securing information: A survey

S Bajpai, K Saxena - Int. J. Emerg. Technol, 2012 - researchgate.net
The main objective of writing this paper is to explore, as many as possible, algorithms and
techniques that have been used by many researchers to provide security to the information …

[PDF][PDF] An insight to steganography

J Bhadra, AM Bojamma, CN Prasad… - Int. J. Innovative Sci. Eng …, 2014 - ijiset.com
Steganography is a useful tool that allows us to covert transmission of information using
certain means or a communications channel. Combining the channel with the encryption …

[引用][C] Survey and analysis of current methods of steganography

M Das, SK Bandyopadhyay - International Journal of modern Trends in Engineering …, 2015

[引用][C] Review of steganography techniques

M Ghonge, A Dhawale, A Tonge - International Journal of Advent Research in …, 2014

[PDF][PDF] A Comprehensive Analysis Of Image Steganography And Its Techniques

I Khalid, M Naeem, A Shahzad, MI Khan… - … (ISSN: 1735-188X), 2021 - researchgate.net
The advancement in technology needs secure system because it is really important to
protect personal data from third party attacks. The more the technology develop it increases …