UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 2
February-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1802159


Registration ID:
180440

Page Number

916-920

Share This Article


Jetir RMS

Title

Review of vital techniques for hiding confidential data using image steganography

Abstract

The quick advancement in the exchange of information through internet made it easier to exchange information exact and faster to the receiver. Security of data is one of the huge components of information technology and communication. Steganography is a term used for information hiding and it is an art of hidden writing. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. So, that observer cannot find the hidden information which we want to send to the receiver. Steganography main objective is to provide robustness, detectability, capacity of hidden data due to which it differs from other techniques such as watermarking and cryptography. This paper proposes a various technique used to hide information on image by an image steganography. In image steganography we hide our secret data in image so that the observer cannot feel its existence. Image steganography strategies are as of late been useful to send any secret message in the secured image carrier to anticipate threats and attacks, though it does not give any sort of opportunity to programmers to discover the secret technique. Image steganography is efficient and better type than other types of steganography. In image steganography data can be secured by the use of spatial and frequency domain. The difference in both is that in frequency domain first information is embedded in the changed picture rather than direct pixel and after that picture is transformed to spatial domain. There are many steganography algorithms in which each has its own advantages and limitations in terms of security and complexity. Critical analysis depends on the type of cover object used, domain of algorithm and imperative properties that are utilized as evaluative measures for Steganographic techniques.

Key Words

Steganography, Information hiding, Cryptography, Spatial domain, Frequency domain, Interpolation

Cite This Article

"Review of vital techniques for hiding confidential data using image steganography", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 2, page no.916-920, February-2018, Available :http://www.jetir.org/papers/JETIR1802159.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Review of vital techniques for hiding confidential data using image steganography", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 2, page no. pp916-920, February-2018, Available at : http://www.jetir.org/papers/JETIR1802159.pdf

Publication Details

Published Paper ID: JETIR1802159
Registration ID: 180440
Published In: Volume 5 | Issue 2 | Year February-2018
DOI (Digital Object Identifier):
Page No: 916-920
Country: Rohtak, Haryana, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003018

Print This Page

Current Call For Paper

Jetir RMS