Complete Study on Steganography
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of steganography is used to share the data secretly and securely. It is the art of hiding the information and it serves as a better way of securing message than cryptography. In this paper we are highlighting the various study, types of steganography and the tools used in it. A lot of researches has done tremendous work in this art but there is lack of a single means to concrete all the information in single study. This paper aims to fulfill that dearth.
Authors and Affiliations
Sheetal Deshpande, Shubham Mallayyanavarmath
Experimental Study on Precast Concrete by Partial-Replacement of Cement with GroundGranulated Blast Slag (Gabs)
Precast Concrete plays a vital role in development of infrastructure i.e. buildings, industrial structures with pace and good quality of construction with efficient quality control. On the other side cost of concrete is...
Establishment of Regenerative Callus, Cell Suspension System and Molecular Characterization of Stevia Rebaudiana Bertoni for the Production of Stevioside in In Vitro
An efficient and standardized medium for callus induction was developed using leaf explants cultured on MS medium supplemented with 1.0mgl-1 1-Naphthaleneacetic acid (NAA) and 1.0 mgl-1 2,4-dichlorophenoxyacetic acid (2...
Performance Parameters Evaluation of Energy- Efficient LEACH Routing Protocol
Wireless sensor network (WSN) consists of a very large number of dispersed and dedicated sensors in order to sense the physical conditions or parameters of the environment like sound, temperature, humidity, pollution le...
Centralized Server Controlled Secure Packet Transmission in Military Network
The development of a novel wide-area centralized damping controller to improve the time consuming in presence of time-varying delay and packet dropout in the communication network. Two different strategies have been ado...
Special Rectangles and Narcissistic Numbers of Order 3 And 4
We search for infinitely many rectangles such that x2 y2 3A S 2 k2 SK Narcissistic numbers of order 3 and 4 respectively, in which x, y represents the length and breadth of the rectangle. Also the total num...