Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 53-66
DOI: 10.3923/rjit.2013.53.66
Steganography-Time to Time: A Review
Rengarajan Amirtharajan and J.B.B. Rayappan

Abstract:
It is time to wrap up the old stories of covert communication. As time goes by, we are updating in each and everything in what we do, want and utilize. Communication and technology are not exceptions. Although they go hand in hand, Internet aficionados often end up with security issues in the former directly or indirectly in touch with the latter. What has to be done? Increasing the security in whatever conveyed to the world online; for that emerging technologies (in our case with an ancient touch!) should be drawn into battle between the originators and mutilators! For efficient way of secret exchange of information, Cryptography and Steganography endow with a phenomenal contribution. The objective is to grant this as a study identifying the nuances of steganography in some notable grounds. This study does not fail to present the principles and attributes of steganography, traditional methods in the past, upcoming directions and also glances through detection mechanisms. Thus, this study gives the readers a good overview about Steganography.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Data Security Through Data Hiding in Images: A Review
  •    Light Weight Steganography on RISC Platform-Implementation and Analysis
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Secure Topology for Electronic Medical Record Transmissions
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
How to cite this article:

Rengarajan Amirtharajan and J.B.B. Rayappan, 2013. Steganography-Time to Time: A Review. Research Journal of Information Technology, 5: 53-66.

DOI: 10.3923/rjit.2013.53.66

URL: https://scialert.net/abstract/?doi=rjit.2013.53.66

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

       

       

Curve Bottom