A Study of Steganography Based Data Hiding Techniques

Vijay Kumar Sharma, Devesh Kr Srivastava, Pratistha Mathur
2017 International Journal of Emerging Research in Management and Technology  
oday the exponential growth in internet users demand secure data communication, for that it is required to send the data in the form of encrypted or hidden form. Many information system security techniques are available. They are classified into three classes as cryptography, steganography and watermarking. This paper presents a review on steganography techniques and their uses and attacks on these. The steganography is commonly known as covert writing and mainly used in hidden communication. A
more » ... reliable internet communication is free from the attacks on it.
doi:10.23956/ijermt/sv6n4/134 fatcat:icrro5cf6zcmfcfpxbp243ztxe