A Review Paper on Data Hiding Techniques: Stegnography

Authors

  • Harshal V. Patil DOCS and IT, Bhusawal Arts, Science & P.O.Nahata Commerce College, Bhusawal
  • B. H. Barhate DOCS and IT, Bhusawal Arts, Science & P.O.Nahata Commerce College, Bhusawal

Keywords:

Stegnography, Stego-Key, Stego-File, LSB, BPCP, PVD, DCT, PSNR

Abstract

Everyone wants the secrecy and safety of their communicating data. In our daily life, we use many secure pathways like internet or telephone for transferring and sharing information, but it`s not safe at a certain level. In the last few years, the security of data over the internet has become a very difficult task. With the increasing usage of internet, the protection of information has become a very important Issue. Information security is one of most important concern in any communication. Data hiding is related field to information security. This is made people to worry about their privacy and works. Steganography is a technique that prevents unauthorized users to have access to the important data. It is the science of hiding the information into the other information so that the hidden information appears to be nothing to the human eyes. In this paper we review different Steganography techniques for hiding the data.

 

References

N. F. Johnson, S. Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE Computer vol. 31, issue 2, pp. 26-34, 1998.

Atallah M. & Al-Shatnawi, (2012) A New Method in Image Steganography with Improved Image Quality, Applied Mathematical Sciences, 6, pp. 3907-391.

Barhate, B.H. & Ramteke. R.J., (2015), Audio Steganography using Combination of LSB and Key for Images, Audio and Text Messages, International Journal of Emerging Technology and Advanced Engineering, 5(7), pp. 231-236.

Doshi,R., & Jain, P., & Gupta, L., (2012) Steganography and Its Applications in Security, International Journal of Modern Engineering Research, 2(6), pp. 4634-4638.

Gunjan Chugh, (2013), Image Steganography Techniques: A Review Article, Acta Technica Corviniensis – Bulletin of Engineering, VI, pp. 97-104

Rakhi, & Gawande, S.,(2013) A Review On Steganography Methods, IJAREEIE, 2(10), pp. 4635-4638.

Anjali A. Shejul, Prof. U. L. Kulkarni, “A DWT based Approach for Steganography using Biometric”, International Conference on Data Storage and Data Engineering, IEEE, pp. 39-43.

Downloads

Published

2018-01-30

How to Cite

[1]
H. V. Patil and B. H. Barhate, “A Review Paper on Data Hiding Techniques: Stegnography”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 6, no. 1, pp. 64–67, Jan. 2018.

Issue

Section

Review Article

Similar Articles

You may also start an advanced similarity search for this article.