Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{194584,
author = {Sai Siddhartha Adepu and Varshitha Reddy Annapureddy and Bhargavi Alishala and Bhavya Bandi},
title = {Steganography: A Data Hiding Technique},
journal = {International Journal of Innovative Research in Technology},
year = {2026},
volume = {12},
number = {10},
pages = {5542-5545},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=194584},
abstract = {Steganography is the practice of hiding information in such a way that the existence of the hidden message is concealed. It provides a stronger method of securing communication compared to cryptography, which only hides the content of a message but not the fact that a message exists. In this paper, we discuss how digital images can be used as carrier files to hide secret messages. By combining a secret image with a carrier image, a hidden image is produced, making the concealed information difficult to detect without proper extraction methods. This paper also explores fundamental steganographic concepts, its history, commonly used techniques, steganalysis, and applications such as digital watermarking.},
keywords = {Steganography, Cryptography, Data Hiding, Digital Watermarking, Steganalysis, LSB, Covert Communication, Image Processing.},
month = {March},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry