Data Hiding Algorithm
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security
FREE-DOWNLOAD KV Ramana, BR Babu… – International Journal, 2011 –
. The different embodiment disciplines of information hiding are shown in following Figure 1. Today,
information security technology has two main . Figure 3. Example color image obtained after random
transformation phase for the text “The goal of steganography is to hide .