UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 3
March-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2403871


Registration ID:
535400

Page Number

i559-i563

Share This Article


Jetir RMS

Title

Steganography -A data security technique

Abstract

With the ever-expanding sum and assortment of information to be put away and transmitted in different mediums, the detail of security which has to be set up at different levels of medium get to and the going with issues of verification and authorization has gotten to be a basic figure. Different steganographic, watermarking and data-embedding calculations have more often than not controlled the real information in arrange to either stow away any pined for data or to give a few levels of get to control over the medium. The mediums are more often than not pictures, video, sound etc., wherein particular parcels or the in general space is as a rule 'corrupted' with 'significant' information. We endeavor to bring out the centrality of the steganographic procedures that are utilized in data handling calculations for information security. It bargains with the issue of information security, centering primarily on pictures, and tries to state the different properties and characteristics that the steganographic calculations ought to have. We moreover highlight the strategy of concealing utilized in the customary steganographic LSB calculations and in its variations. Steganography, an antiquated procedure dating back to the days of Herodotus, has advanced into a modern strategy of concealing touchy data inside harmless carriers, such as pictures, sound records, or indeed content. In today's computerized age, where information security is fundamental, steganography plays a pivotal part in defending data from prying eyes and unauthorized get to. This unique investigates the standards, methods, and applications of steganography in cutting edge information security paradigms.

Key Words

Steganography, LSB, Information Security, Secret Message, Encoding

Cite This Article

"Steganography -A data security technique", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 3, page no.i559-i563, March-2024, Available :http://www.jetir.org/papers/JETIR2403871.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Steganography -A data security technique", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 3, page no. ppi559-i563, March-2024, Available at : http://www.jetir.org/papers/JETIR2403871.pdf

Publication Details

Published Paper ID: JETIR2403871
Registration ID: 535400
Published In: Volume 11 | Issue 3 | Year March-2024
DOI (Digital Object Identifier):
Page No: i559-i563
Country: Palakkad, Kerala, India .
Area: Science
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00025

Print This Page

Current Call For Paper

Jetir RMS