A Review of Security and Data Hiding Techniques
Abhishek Kumar1, Anuranjan Misra2
1Mr. Abhishek Kumar, M.Tech Student, Department of Electronics and Communication, Noida International University, Delhi National Capital Region Noida, India.
2Dr. Anuranjan Misra, Professor & Head, Department of Computer Science and Engineering, Noida International University, Delhi National Capital Region Noida, India.
Manuscript Received on August 11, 2015. | Revised Manuscript Received on August 20, 2015. | Manuscript published on August 20, 2015. | PP: 29-31 | Volume-3 Issue-9, August 2015. | Retrieval Number: I0655083915/2015©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. There are different types of steganography techniques each have their strengths and weaknesses. In this paper, we review the different security and data hiding techniques that are used to implement a steganography such as LSB, ISB, MLSB.
Keywords: LSB, ISB, MLSB, Steganography