A Review Paper on Data Hiding Techniques: Stegnography
Keywords:
Stegnography, Stego-Key, Stego-File, LSB, BPCP, PVD, DCT, PSNRAbstract
Everyone wants the secrecy and safety of their communicating data. In our daily life, we use many secure pathways like internet or telephone for transferring and sharing information, but it`s not safe at a certain level. In the last few years, the security of data over the internet has become a very difficult task. With the increasing usage of internet, the protection of information has become a very important Issue. Information security is one of most important concern in any communication. Data hiding is related field to information security. This is made people to worry about their privacy and works. Steganography is a technique that prevents unauthorized users to have access to the important data. It is the science of hiding the information into the other information so that the hidden information appears to be nothing to the human eyes. In this paper we review different Steganography techniques for hiding the data.
References
N. F. Johnson, S. Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE Computer vol. 31, issue 2, pp. 26-34, 1998.
Atallah M. & Al-Shatnawi, (2012) A New Method in Image Steganography with Improved Image Quality, Applied Mathematical Sciences, 6, pp. 3907-391.
Barhate, B.H. & Ramteke. R.J., (2015), Audio Steganography using Combination of LSB and Key for Images, Audio and Text Messages, International Journal of Emerging Technology and Advanced Engineering, 5(7), pp. 231-236.
Doshi,R., & Jain, P., & Gupta, L., (2012) Steganography and Its Applications in Security, International Journal of Modern Engineering Research, 2(6), pp. 4634-4638.
Gunjan Chugh, (2013), Image Steganography Techniques: A Review Article, Acta Technica Corviniensis – Bulletin of Engineering, VI, pp. 97-104
Rakhi, & Gawande, S.,(2013) A Review On Steganography Methods, IJAREEIE, 2(10), pp. 4635-4638.
Anjali A. Shejul, Prof. U. L. Kulkarni, “A DWT based Approach for Steganography using Biometric”, International Conference on Data Storage and Data Engineering, IEEE, pp. 39-43.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.