Understanding Steganography over Cryptography and Various Steganography Techniques?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.4, No. 3)Publication Date: 2015-03-30
Authors : Rajesh Kumar; A.J. Singh;
Page : 253-258
Keywords : Steganography; Cryptography; steganography techniques; text steganography; LSB; watermarking; crossbreeding;
Abstract
This paper is all about the study of the steganography and techniques used for the steganography. Firstly we will understand the term steganography, use of steganography and techniques used for the steganography. In steganography, we use text transformation, LSB (Least Significant Bit), graphics or image steganography, audio steganography, steganography in videos and animations etc. This paper includes the study of these techniques and how it works.
Other Latest Articles
- A Study on Traffic Engineering Architecture for Multiprotocol Label Switching?
- Wavelet based Linear Gaussian Image Denoising Methods
- An Iterative PSO for Web worth Optimization through random velocity
- Design and Implementation of a Mobile Students’ Course Registration Platform
- A case report: Soy milk - a possible cause of Hashimoto's thyroiditis
Last modified: 2015-03-24 21:45:58