Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{146184,
author = {Anshul Vyas and Anuj Batla},
title = {Image Steganography},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {4},
number = {11},
pages = {1777-1781},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=146184},
abstract = {Steganography is the specialty of concealing the way that correspondence is occurring, by concealing data in other data. A wide range of bearer record organizations can be utilized, yet computerized pictures are the most prominent as a result of their recurrence on the web. For concealing mystery data in pictures, there exists a substantial assortment of steganography systems some are more mind boggling than others and every one of them have separate solid and powerless focuses. Distinctive applications may require outright intangibility of the mystery data, while others require a huge mystery message to be covered up. This task report plans to give a review of picture steganography, its uses and procedures. It additionally endeavors to distinguish the prerequisites of a decent steganography calculation and quickly thinks about which steganographic procedures are more reasonable for which applications},
keywords = {},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry