Steganography Techniques:A Review

  • Unique Paper ID: 143651
  • Volume: 2
  • Issue: 12
  • PageNo: 387-391
  • Abstract:
  • This paper gives a review of different steganography techniques that are very powerful security approaches to hide a secret messages, text files, images, audio, video etc. inside an object can be achieved effectively that increases security as its very important to provide security to your data so that no unauthorized person can access it.
add_icon3email to a friend

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{143651,
        author = {TARIQ RASHID and SUNNY DAGAR},
        title = {Steganography Techniques:A Review },
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {2},
        number = {12},
        pages = {387-391},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=143651},
        abstract = {This paper gives a review of different steganography techniques that are very powerful security approaches to hide a secret messages, text files, images, audio, video etc. inside an object can be  achieved effectively that increases security as its very important to provide security to your data so that no unauthorized person can access it.},
        keywords = {Stego-image, least significant bit (LSB), Phase coding, Payload capacity.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 2
  • Issue: 12
  • PageNo: 387-391

Steganography Techniques:A Review

Related Articles