Analysis of UPQC for Voltage Sag Compensation in Wind Farms to Weak Grid Connections
Journal: International Journal of Engineering and Techniques (Vol.4, No. 3)Publication Date: 2018-06-01
Authors : Manoj Kumar S. H Chetan Kumar G.S;
Page : 247-250
Keywords : Steganography; data security; Communication; Image Steganography; Stego-Key.;
Abstract
Steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. There are different types of steganography techniques each have their strengths and weaknesses. In this paper, we review the different security and data hiding techniques that are used to implement a steganography such as LSB, ISB, MLSB etc.
Other Latest Articles
Last modified: 2018-07-07 16:34:23