Call For Paper

Volume 10 Issue 3

March 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

A Survey on Image Steganography with its Related Techniques and its Types

Author(s):

Yash Kumar Singh

Keywords:

Steganography; Types; Model; Techniques.

Abstract

Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The hidden message may be text, image, audio, video, etc. The files can be a cover image after inserting the message into the cover image using a stego-key. It is reffered to as stego-image. Steganography is the art of hiding information through original files in such a manner that the existence of the message is unknown. The term steganography is coming from the Greek word Steganos, which means, “Covered Writing”. The original files can be referred to as cover text, cover image, or cover audio. After inserting the secret message it is referred to as stego-medium. A stego-key is used for hiding process to restrict detection and/or recovery of the embedded data. While cryptography protects the content of messages, steganography hides the message so that intermediate persons cannot see the message. In this paper, we define survey on steganography , types on steganography, classification on steganography and techniques of steganography, etc.

Other Details

Paper ID: IJSARTV
Published in: Volume : 2, Issue : 4
Publication Date: 4/4/2016

Article Preview




Download Article