[PDF][PDF] Steganography techniques: A review

MPR Kamble, MPS Waghamode… - International Journal of …, 2013 - academia.edu
Steganography is a useful technique for hiding data behind the carrier file such as image,
audio, video etc. and that data securely transfer from sender to receiver. The cryptography is …

Image steganography scheme based on reversible data embedding strategy

UT Tilakaratne… - 2013 8th International …, 2013 - ieeexplore.ieee.org
Steganography is communicating in a way which hides the existence of the information. The
cover media can be any general digital format, such as, text, image, audio, video, etc. By …

[PDF][PDF] Steganography in colored images

IT Sedeeq - International Journal of Computer Science and …, 2013 - researchgate.net
Since people use internet daily they have to take care about information security
requirement more and more. In this wok a new algorithm for RGB based images …

[PDF][PDF] Survey on Robust Steganographic Techniques

CR Geetha, C Puttamadappa - 2013 - ijecce.org
Steganography is a powerful tool which is used to hide the information in some other
information and transmitting it so that the presence of the secret information itself is …

[引用][C] Dynamic Key Based Approaches for Security Amelioration in Spatial Domain Image Steganography

P Thiyagarajan - 2013 - dspace.pondiuni.edu.in
The secure transmission of information is the need of the hour in “Information world”.
Cryptography and Information hiding are the techniques which transmit information securely …

[引用][C] Advance Scheme for Secret Data Hiding System using Hop field & LSB

I Singh, JP Raina - International Journal of Computer Trends and …, 2013