A Review on Various Approaches for Data Hiding
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 1)Publication Date: 2016-01-05
Authors : Sukhjinder Pal Kaur; Sonika Jindal;
Page : 602-605
Keywords : image stegnography; RGB; Least Significant Bit; Intermediate Significant Bit;
Abstract
The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text or even floppy disks) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
Other Latest Articles
- Study of Pap Smear Examination in Patients with Complaint of Vaginal Discharge
- A Detection of the Quality of Sound Gear based on Digital Signal Processing Techniques
- Toxicological Studies on a Soil Micro-Arthropod: An Indication on the Potential Threat in Soil Humus Formation
- Growth Performance of Archachatina Marginata Bred on the Substrate Amended with Industrial Calcium: Mikhart
- Reproduction of African Tigrine Frog Hoplobatrachus occipitalis in Banco National Park (Ivory Coast)
Last modified: 2021-07-01 14:30:04