High Impact Factor : 7.883
Submit your paper here

Impact Factor

7.883


Call For Paper

Volume: 11 Issue 01 January 2025


Download Paper Format


Copyright Form


Share on

Comprehensive Review Of Various Types Of Steganographic Implementations

  • Author(s):

    Gunit Malik | Siddhant Modi

  • Keywords:

    Steganography, Cryptography, Data Hiding, Image, Audio, Web, Text.

  • Abstract:

    Since The Rise Of The Internet, Security Has Been One Of The Most Important Factors Of Information Technology And Communication. Cryptography Was Created As A Technique To Secure The Secrecy Of Communication By Encrypting And Decrypting Data To Keep The M

Other Details

  • Paper id:

    IJSARTV4I1127890

  • Published in:

    Volume: 4 Issue: 11 November 2018

  • Publication Date:

    2018-11-08


Download Article