High Capacity Steganography with Improved Transformation and Security Technique:A survey
Author(s):
Bhumin Mandaliya, Vinit Gupta
Keywords:
Cryptography, Steganography, Trtansformation, Encryption
Abstract
Security is the primary requirement of in any area. We can apply security in two point of views. One is the cryptography and the other one is steganography. Cryptography is the way to alter the plaintext data to cipher text by some algorithm. In steganography scheme, the data is never modified and just it is hidden behind some image. Central idea of this paper is compare and study of several algorithms of applying steganography and their various ways. Finally, it concludes with comparison of all these papers and included strategies.
Article Details
Unique Paper ID: 143300

Publication Volume & Issue: Volume 0, Issue no

Page(s): 0 - 0
Article Preview & Download


Share This Article

Conference Alert

NCSST-2021

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2021

Go To Issue



Call For Paper

Volume 9 Issue 10

Last Date for paper submitting for March Issue is 25 March 2023

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies