Steganography Techniques - An Overview

  • Amitava Podder
  • Piyal Roy
  • Smaranika Roy
N/ACitations
Citations of this article
84Readers
Mendeley users who have this article in their library.

Abstract

Cryptography, or the use of code, has a sinister relative called steganography. Steganography is supposed to offer confidentiality whereas encryption is said to provide privacy. A method of concealed communication is steganography. The process of steganography involves hiding a message in a suitable carrier, such as an image or audio file, which can then be transported to the receiver without anybody being aware that it contains a hidden message. This is a method that civil rights organizations in oppressive states, for instance, might utilize to propagate their message without the knowledge of their own government. This paper aims to discuss different techniques for implementing steganography to multimedia files (text, still images, audio, and video).

Cite

CITATION STYLE

APA

Amitava Podder, Piyal Roy, & Smaranika Roy. (2022). Steganography Techniques - An Overview. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 323–327. https://doi.org/10.32628/cseit228642

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free