ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Analysis of UPQC for Voltage Sag Compensation in Wind Farms to Weak Grid Connections

Journal: International Journal of Engineering and Techniques (Vol.4, No. 3)

Publication Date:

Authors : ;

Page : 247-250

Keywords : Steganography; data security; Communication; Image Steganography; Stego-Key.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. There are different types of steganography techniques each have their strengths and weaknesses. In this paper, we review the different security and data hiding techniques that are used to implement a steganography such as LSB, ISB, MLSB etc.

Last modified: 2018-07-07 16:34:23