Full Paper View

Data Security by Steganography: A Review

S. Bansal1

Section:Review Paper, Product Type: Journal
Vol.7 , Issue.1 , pp.10-12, Mar-2019

Online published on Mar 10, 2019

Copyright © S. Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

XML View     PDF Download

Citation :
IEEE Style Citation: S. Bansal, “Data Security by Steganography: A Review”, International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.1, pp.10-12, 2019.

MLA Style Citation: S. Bansal "Data Security by Steganography: A Review." International Journal of Scientific Research in Network Security and Communication 7.1 (2019): 10-12.

APA Style Citation: S. Bansal, (2019). Data Security by Steganography: A Review. International Journal of Scientific Research in Network Security and Communication, 7(1), 10-12.

14 Views    12 Downloads    4 Downloads

Abstract :
There is huge amount of data can be transmitted or store on internet in today life. This is not simple data, which is use or share by public or group of society, while personal, financial or secret data storing or transmitting for any personal or financial transaction. This is secret data, which we want to hide. Steganography is very latest or important field like cryptography. Cryptography use for privacy while Steganography use for secrecy. Steganography is a process of hiding the message in any kind of transfer file like image, audio, video. E-commerce is an application of internet, which is using rapidly day by day. The main concern of e-commerce to provide security in such way user can use without afraid. Steganography can be play very important role to provide security in e-commerce transaction. These data transactions include sensitive document transfer, digital signature authentication and digital data storage. This research paper show use of digital or image Steganography for information security through the Internet.

Key-Words / Index Term :
Security, Steganography, Image Steganography

References :
[1] R. Doshi, P. Jain, L. Gupta, “Steganography and its application in security, “International Journal of Modern Engineering Research(IJMER), vol. 2, no. 6, pp. 4634-4638, 2012.
[2] G. Prabakaran, R. Bhavani, P.S. Rajeswari, “Multi secure and robustness for medical image based steganography scheme, “Circuits, Power and Computing Technologies(ICCPCT), 2013 International Conference, pp. 1188-1193, 20-21 March 2013.
[3] N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality of LSB based image Steganography, “Computational Intelligence and Communication Networks(CICN), 2013 5th International Conference, pp. 385-390, 27-29 Sept. 2013.
[4] M. Junej, P. S. Sandhu, “Designing of Robust Image Steganography Technique based on LSB Insertion and Encryption”, ICARTCC, 2009.

Authorization Required


You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  editor@isroset.org or view contact page for more details.

Impact Factor

Journals Contents

Author & Reviewer


Digital Certificate

Go to Navigation