Call For Paper

Volume 10 Issue 4

April 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

A Comparative Study on Cryptography, Steganography and Watermarking Techniques used for Data Security

Author(s):

Lalit Mohan

Keywords:

Steganography, Cryptography, Watermarking, Symmetric key cryptography.

Abstract

Cryptography, Steganography and Watermarking are three popular ways of sending information in a secret way. Now a day’s computer applications are developed to handle financial and personal data, the real need for data security. Data security means protecting Data from unauthorized access. It is very challenging task to transmit data from sender to authorized receiver with full security through an insecure media. This paper is an attempt to analyze the data protecting techniques such as steganography, cryptography and watermarking.

Other Details

Paper ID: IJSARTV
Published in: Volume : 2, Issue : 8
Publication Date: 8/13/2016

Article Preview




Download Article