Steganography using Various Security Methods

Main Article Content

Narender Kumar
Suhail Javed Quraishi
Usha
Roopa Kumari
Shobhit Srivastava

Abstract

There are several techniques to encrypt data, but steganography is one of the most popular.
The objective is to prevent attackers from learning about the embedded data since when the
feature is visible, they know where to attack. There are several uses for steganography.
Nevertheless, it might be abused for evil intentions, just like any other science. It is now at
the forefront of modern security techniques because to the phenomenal development in
computer power and growing security awareness among individuals, groups, and
organisations, including the government.Steganography's main objectives are undetectability,
robustness, and hidden data capacity, which sets it apart from related techniques like
watermarking and cryptography. In order to provide a current state of the art, many
steganographic techniques are examined and assessed in this article along with certain
standard criteria and principles culled from the literature. The recommendations and findings
of this article promote object-oriented embedding. Although it will be briefly discussed, the
science of steganography attack, also called as steganalysis, is outside the purview of this
research.

Article Details

Section
Articles