Complete Study on Steganography

Abstract

Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of steganography is used to share the data secretly and securely. It is the art of hiding the information and it serves as a better way of securing message than cryptography. In this paper we are highlighting the various study, types of steganography and the tools used in it. A lot of researches has done tremendous work in this art but there is lack of a single means to concrete all the information in single study. This paper aims to fulfill that dearth.

Authors and Affiliations

Sheetal Deshpande, Shubham Mallayyanavarmath

Keywords

Related Articles

Experimental Study on Precast Concrete by Partial-Replacement of Cement with GroundGranulated Blast Slag (Gabs)

Precast Concrete plays a vital role in development of infrastructure i.e. buildings, industrial structures with pace and good quality of construction with efficient quality control. On the other side cost of concrete is...

Establishment of Regenerative Callus, Cell Suspension System and Molecular Characterization of Stevia Rebaudiana Bertoni for the Production of Stevioside in In Vitro

An efficient and standardized medium for callus induction was developed using leaf explants cultured on MS medium supplemented with 1.0mgl-1 1-Naphthaleneacetic acid (NAA) and 1.0 mgl-1 2,4-dichlorophenoxyacetic acid (2...

Performance Parameters Evaluation of Energy- Efficient LEACH Routing Protocol

Wireless sensor network (WSN) consists of a very large number of dispersed and dedicated sensors in order to sense the physical conditions or parameters of the environment like sound, temperature, humidity, pollution le...

Centralized Server Controlled Secure Packet Transmission in Military Network

The development of a novel wide-area centralized damping controller to improve the time consuming in presence of time-varying delay and packet dropout in the communication network. Two different strategies have been ado...

Special Rectangles and Narcissistic Numbers of Order 3 And 4

We search for infinitely many rectangles such that x2  y2  3A  S 2  k2  SK  Narcissistic numbers of order 3 and 4 respectively, in which x, y represents the length and breadth of the rectangle. Also the total num...

Download PDF file
  • EP ID EP24580
  • DOI -
  • Views 330
  • Downloads 7

How To Cite

Sheetal Deshpande, Shubham Mallayyanavarmath (2017). Complete Study on Steganography. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk./articles/-A-24580