Data Security by Steganography: A Review

Authors

  • S. Bansal Department of Computer Science & Application, Prestige Institute of Management, Gwalior, India

Keywords:

Security, Steganography, Image Steganography

Abstract

There is huge amount of data can be transmitted or store on internet in today life. This is not simple data, which is use or share by public or group of society, while personal, financial or secret data storing or transmitting for any personal or financial transaction. This is secret data, which we want to hide. Steganography is very latest or important field like cryptography. Cryptography use for privacy while Steganography use for secrecy. Steganography is a process of hiding the message in any kind of transfer file like image, audio, video. E-commerce is an application of internet, which is using rapidly day by day. The main concern of e-commerce to provide security in such way user can use without afraid. Steganography can be play very important role to provide security in e-commerce transaction. These data transactions include sensitive document transfer, digital signature authentication and digital data storage. This research paper show use of digital or image Steganography for information security through the Internet.

 

References

R. Doshi, P. Jain, L. Gupta, “Steganography and its application in security, “International Journal of Modern Engineering Research(IJMER), vol. 2, no. 6, pp. 4634-4638, 2012.

G. Prabakaran, R. Bhavani, P.S. Rajeswari, “Multi secure and robustness for medical image based steganography scheme, “Circuits, Power and Computing Technologies(ICCPCT), 2013 International Conference, pp. 1188-1193, 20-21 March 2013.

N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality of LSB based image Steganography, “Computational Intelligence and Communication Networks(CICN), 2013 5th International Conference, pp. 385-390, 27-29 Sept. 2013.

M. Junej, P. S. Sandhu, “Designing of Robust Image Steganography Technique based on LSB Insertion and Encryption”, ICARTCC, 2009.

Downloads

Published

2019-03-10

How to Cite

[1]
S. Bansal, “Data Security by Steganography: A Review”, Int. J. Sci. Res. Net. Sec. Comm., vol. 7, no. 1, pp. 10–12, Mar. 2019.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.