International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-11,Issue-8  ( Aug, 2023 )
Past issues
  1. Volume-11,Issue-7  ( Jul, 2023 )
  2. Volume-11,Issue-6  ( Jun, 2023 )
  3. Volume-11,Issue-5  ( May, 2023 )
  4. Volume-11,Issue-4  ( Apr, 2023 )
  5. Volume-11,Issue-3  ( Mar, 2023 )
  6. Volume-11,Issue-2  ( Feb, 2023 )
  7. Volume-11,Issue-1  ( Jan, 2023 )
  8. Volume-10,Issue-12  ( Dec, 2022 )
  9. Volume-10,Issue-11  ( Nov, 2022 )
  10. Volume-10,Issue-10  ( Oct, 2022 )

Statistics report
Dec. 2023
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 128
Paper Published : 1530
No. of Authors : 3973
  Journal Paper


Paper Title :
Improve Security of Data using Image Steganography and Cryptography Method

Author :Mahendera Kumar Sahu, Mohd. Shajid Ansari

Article Citation :Mahendera Kumar Sahu ,Mohd. Shajid Ansari , (2017 ) " Improve Security of Data using Image Steganography and Cryptography Method " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 55-59, Volume-5,Issue-11

Abstract : Steganography is a form of security technique through obscurity, the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to pelt stealthy information’s in numerous types of records, with digital images, audio and video. The three most important parameters for image steganography are noiselessness, payload, and sturdiness. Different applications have different requirements of the steganography technique used. This paper aims to provide an impression of image steganography, its practises and methods. Steganography is the exercise of whacking secretive or penetrating data within somewhat that seems to be nobody out to the common. Various transporter file arrangements can be used, but digital images are the furthermost widespread because of their occurrence on the internet. For conceal secret message in images, there be a large variability of steganography methods some are more multifaceted than others and all of them have relevant robust and weak points. Different solicitations might involve entire faintness of the stealthy information, although others involve a huge stealthy message to be concealed. Keywords - Steganography, Image Steganography.

Type : Research paper

Published : Volume-5,Issue-11


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-9853   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 65
| Published on 2018-01-08
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY