Corpus ID: 212505533

Review Paper on Steganography Techniques

@inproceedings{Lather2015ReviewPO,
  title={Review Paper on Steganography Techniques},
  author={Y. Lather and Megha Goyal and Vivek Lather},
  year={2015}
}
This paper is focusing on security of information. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. Steganography can be viewed as akin to… Expand
2 Citations

Figures from this paper

Analysis of Image Steganography Performance Check Using Bit Selection
Hiding Fingerprint Minutiae in Multiple Facial Images Using BPCS
  • PDF

References

SHOWING 1-10 OF 12 REFERENCES
On the limits of steganography
  • 1,365
  • PDF
Digital steganography: hiding data within data
  • 510
  • PDF
A Review of Data Hiding in Digital Images
  • 189
  • PDF
An evaluation of image based steganography methods
  • 280
  • PDF
An Information-Theoretic Model for Steganography
  • C. Cachin
  • Computer Science
  • Information Hiding
  • 1998
  • 894
  • PDF
JPEG Based Conditional Entropy Coding for Correlated Steganography
  • L. Zheng, I. Cox
  • Computer Science
  • 2007 IEEE International Conference on Multimedia and Expo
  • 2007
  • 10
  • PDF
Translation-Based Steganography
  • 64
  • PDF
Natural Language Watermarking and Tamperproofing
  • 176
  • PDF
...
1
2
...