Study of Steganography Techniques – A Review

Abhishek Sharma, Vijay Sharma

Abstract


In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. There are different types of steganography techniques each have their strengths and weaknesses. In this paper, we review the different security and data hiding techniques that are used to implement a steganography such as LSB, ISB, MLSB etc.
Key words: .

Keywords


Steganalysis; Discrete Cosine Transformation DCT; Ipv four header; IP datagram fragmentation

Full Text:

PDF




Copyright (c) 2015 Abhishek Sharma, Vijay Sharma

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org