A Chatterjee, AK Das - Progress in Advanced Computing and Intelligent …, 2018 - Springer
Recently, many applications are Internet-based where confidentiality is maintained by secret communication. Cryptography and steganography are two popular methods used for the …
P Rawat, AK Pandey… - 2015 International …, 2015 - ieeexplore.ieee.org
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms F5 algorithm is more robust and secure. It can be more …
Steganography is the science that involves encrypting data in a suitable multimedia carrier, such as image, audio, and video files. The main purpose of image steganography is to hide …