Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{143300, author = {Bhumin Mandaliya and Vinit Gupta}, title = {High Capacity Steganography with Improved Transformation and Security Technique:A survey}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {0}, number = {no}, pages = {0-0}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=143300}, abstract = {Security is the primary requirement of in any area. We can apply security in two point of views. One is the cryptography and the other one is steganography. Cryptography is the way to alter the plaintext data to cipher text by some algorithm. In steganography scheme, the data is never modified and just it is hidden behind some image. Central idea of this paper is compare and study of several algorithms of applying steganography and their various ways. Finally, it concludes with comparison of all these papers and included strategies.}, keywords = {Cryptography, Steganography, Trtansformation, Encryption}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry