Study of Steganography Techniques – A Review
Abstract
In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. There are different types of steganography techniques each have their strengths and weaknesses. In this paper, we review the different security and data hiding techniques that are used to implement a steganography such as LSB, ISB, MLSB etc.
Key words: .
Key words: .
Keywords
Steganalysis; Discrete Cosine Transformation DCT; Ipv four header; IP datagram fragmentation
Full Text:
PDFCopyright (c) 2015 Abhishek Sharma, Vijay Sharma
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org