Modern Steganographic technique: A survey
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 9
Abstract
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The hidden message may be text, image, audio, video, etc. The files can be a cover image after inserting the message into the cover image using stego-key. It is reffered to as stego-image. Steganography is now more important due to the exponential growth and secret communication of potential computer users on the internet. In this paper I have analyzed various steganographic techniques. It also given an overview of steganography, different methods of steganography, its applications, how it is different from cryptography.
Authors and Affiliations
Pratap Chandra Mandal
A REVIEW ON CODE COVERAGE ANALYSIS
The quality of any software predominantly depends upon the software testing. Code coverage testing is one such technique that plays an important role to achieve the software for better quality and maintenance. The code c...
Operations on Signed Numbers
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...
Efficient Data Sharing with Unbounded Ciphertext Classes in Cloud Storage using Single key
Cloud computing is an emerging paradigm in which resources of the computing infrastructure can be able to share over the internet. As this paradigm also have many challenges for data security and access control when user...
Fingerprint Biometric System: A Survey
Fingerprint recognition is one of famous biometric system that is mostly used in various authentication techniques. Human fingerprint exhibit some certain details marked on it, categorized it as minutiae, which can be us...
Routing protocols in underground coalmine environment: A Review
Researchers have worked on routing issues for adhoc-networks, VANET’s, and Wireless Sensor Networks in a normal scenario; recently there has been a recent trend towards the study on underground wireless networks and prop...