STEGANOGRAPHY-2020


Steganography is a method of hiding secret data, by embedding it into an audio, video, image or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks.

StegoNote: Steganography in Guitar Music Using Note Modulation
free download

Due to its diversity, sensual and physical redundancies, music is considered as a type of ideal carrier for steganography , and has attracted increasing attention from the research community of information hiding. In this paper, we present a novel note-modulating

Improved Steganography Scheme based on Fractal Set
free download

Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It plays a significant role in current trends for providing secure communication and guarantees accessibility of secret information by authorised parties only

A Study of Text Steganography Methods
free download

Based on the development of information and communication technology, then the security improvement will be more important. One of them is the level of security in inserting data or information. Increased security to insert data and information can be resolved using

AN EFFECTIVE AND SECURE DIGITAL IMAGE STEGANOGRAPHY SCHEME USING TWO RANDOM FUNCTION AND CHAOTIC MAP
free download

Among the critical features of actions and strategies in the information and communications technology period is securing information. The reliability of information ought to be the main consideration in the discrete transfer of information between two people. For the security of

Image steganography using least significant bit and secret map techniques.
free download

In steganography , secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a

Analysis of Steganography on TIFF Image using Spread Spectrum and Adaptive Method
free download

Nowadays the development of technology and information is very rapid and fast. Anyone can easily access or send any data and information which creates a problem to improve the system. The hidden message technique called steganography is a technique that allows

Review on secured data capabilities of cryptography, steganography , and watermarking domain
free download

Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The

A Comparison of Steganography in the GIF Image using LSB and Spread Spectrum Method
free download

Graphics Interchange Format (GIF) is a graphics format that is most often used for the purposes of website design. The GIF has a bit more color combinations than JPEG but able to store graphics with background transparent or in the form of a simple animation. Because

A SYMMETRIC KEY BASED STEGANOGRAPHY CALCULATION FOR ANCHORED INFORMATION
free download

Advancement in technology have brought about several sophisticated devices, using electronic media communication is more prone to attacks than communicating over traditional channels. While the traditional communication systems were insecure, it was

Comparing Original and Encrypted Sizes of Colorful Images by Steganography
free download

In todays digital world the secure and confidential data transmission by the various ways is quite vital. In order to avoid attacks which aim to receive data unauthorizedly, many different techniques have been developed by the years. In this paper one of these techniques called

DATA HIDING IN IMAGE BASED AUTHENTICATION USING COMBINATION OF ZERO-KNOWLEDGE PROTOCOL AND STEGANOGRAPHY
free download

One other most important aspects in information security nowadays is to understand when creating or improving the websites login procedure or known as user authentication. The concept that is useful to secure or authenticate the system is the simple text-based


COMMENT IEEE-PAPER-2020



FREE IEEE PAPER