[引用][C] Steganography with cryptography technique for data hiding

GD Rote, AM Patil - Int. J. Sci. Res, 2015

[PDF][PDF] Analysis of different steganographic algorithms for secured data hiding

M Umamaheswari, S Sivasubramanian… - … International Journal of …, 2010 - academia.edu
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden
message. If suspicion is raised, steganography may fail. The success of steganography …

[PDF][PDF] Steganography Cryptography and Watermarking: A Review

SK Dubey, V Chandra - … Journal of Innovative Research in Science …, 2017 - academia.edu
In this digital era, it is simple to produce and create multiple copies of the data which can
either be text, audio, image, softwares etc. This creates a problem concerning the protection …

[PDF][PDF] Study on image steganography techniques

CG Gayathri, VK Kalpana - Study on Image Steganography Techniques, 2013 - Citeseer
Steganography is a secret Communication to hide the secret Data. It is an invisible
communication that hides data like text, image, and audio, video etc. The secret message is …

[PDF][PDF] A survey on different techniques for covert communication using steganography

TK Hazra, M Haldar, M Mukherjee… - IOSR J. Comput. Eng …, 2018 - academia.edu
With digitization, data hiding has become more important than ever. Steganography forms
an undisputable tool to attain privacy during data sharing. Steganography is the art and …

[PDF][PDF] Steganography and its applications in security

R Doshi, P Jain, L Gupta - International Journal of Modern Engineering …, 2012 - Citeseer
Steganography is the dark cousin of cryptography, the use of codes. While cryptography
provides privacy, steganography is intended to provide secrecy. Steganography is a method …

[PDF][PDF] Role of steganography in security issues

S Pramanik, RP Singh - … Journal of Advance Research in Science …, 2017 - researchgate.net
With the ever increasing amount and variety of data to be stored and transmitted in various
mediums, the specification of security which has to be established at various levels of …

[PDF][PDF] A Proposed Technique for Hiding Encrypted Data in Video Files

M El-Bayoumy, M El-Mogy, A Abou El-Fetouh… - International Journal of …, 2013 - Citeseer
Computer technology and the Internet have made a breakthrough in the existence of data
communication. Securing the data transfer over a transmission media has become of great …

[PDF][PDF] Review of different techniques used in recent steganography researches

JA Mazumder, K Hemachandran - International Journal of …, 2012 - academia.edu
As the network technology grows it is necessary to achieve the security of data during
communication through the network. In everyday life we use internet for sending our …

[PDF][PDF] Types and tools of steganography

N Arora - International Journal for Research in Applied Science …, 2022 - academia.edu
Steganography is the practice of concealing a secret message inside of another message. It
is a form of covert communication and can involve the use of any medium like a computer …