• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (2), 2013
  3. 53-66
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 53-66

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 306

Authors


Rengarajan Amirtharajan

Country: India

J.B.B. Rayappan

Country: India

Keywords


  • steganography
  • information hiding
  • data hiding
  • Data security
  • steganalysis
Review Article

Steganography-Time to Time: A Review

Rengarajan Amirtharajan and J.B.B. Rayappan
It is time to wrap up the old stories of covert communication. As time goes by, we are updating in each and everything in what we do, want and utilize. Communication and technology are not exceptions. Although they go hand in hand, Internet aficionados often end up with security issues in the former directly or indirectly in touch with the latter. What has to be done? Increasing the security in whatever conveyed to the world online; for that emerging technologies (in our case with an ancient touch!) should be drawn into battle between the originators and mutilators! For efficient way of secret exchange of information, Cryptography and Steganography endow with a phenomenal contribution. The objective is to grant this as a study identifying the nuances of steganography in some notable grounds. This study does not fail to present the principles and attributes of steganography, traditional methods in the past, upcoming directions and also glances through detection mechanisms. Thus, this study gives the readers a good overview about Steganography.
PDF Fulltext XML References Citation

How to cite this article

Rengarajan Amirtharajan and J.B.B. Rayappan, 2013. Steganography-Time to Time: A Review. Research Journal of Information Technology, 5: 53-66.

URL: https://scialert.net/abstract/?doi=rjit.2013.53.66

Related Articles

Data Security Through Data Hiding in Images: A Review
Light Weight Steganography on RISC Platform-Implementation and Analysis
Graphical Password Authentication Scheme for Embedded Platform
Least Significant Bit but Quantum Bit: A Quasi Stego
Comparative Analysis of (5/3) and Haar IWT Based Steganography
Arabic Text Steganography using Kashida Extensions with Huffman Code
Hiding Data in Video File: An Overview
Secure Topology for Electronic Medical Record Transmissions
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved