Normal view MARC view ISBD view

Data security using steganography

By: Babando, Aliyu Kamalu.
Contributor(s): Bamanga, Mahmud Ahmad.
Publisher: Haryana IOSR - International Organization of Scientific Research 2022Edition: Vol.24(4), Jul-Aug.Description: 56-65p.Subject(s): Computer EngineeringOnline resources: Click here In: IOSR Journal of Computer Engineering (IOSR-JCE)Summary: Steganography is a fascinating topic that is unique from the everyday cryptography and system administration that most of us deal with. Steganography is a type of code that can be used to communicate covertly. We looked into steganography's theoretical and practical limitations. We used the LSB methodology to print out the picture steganography system enhancement to provide a secure communication method. This steganography computer software shows how to use any text format to hide any type of information. The capacity of this application to support any type of text is its crowning achievement. Since prehistoric times, man has yearned for the capacity to converse in a private manner. Steganography isn't just for military or espionage objectives, as evidenced by the recent boom in research into watermarking to safeguard intellectual property. Steganography, like cryptography, will become more important in the future for safe communication in the "digital world."
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
Articles Abstract Database Articles Abstract Database School of Engineering & Technology
Archieval Section
Not for loan 2022-2013
Total holds: 0

Steganography is a fascinating topic that is unique from the everyday cryptography and system
administration that most of us deal with. Steganography is a type of code that can be used to communicate
covertly. We looked into steganography's theoretical and practical limitations. We used the LSB
methodology to print out the picture steganography system enhancement to provide a secure
communication method. This steganography computer software shows how to use any text format to hide
any type of information. The capacity of this application to support any type of text is its crowning
achievement. Since prehistoric times, man has yearned for the capacity to converse in a private manner.
Steganography isn't just for military or espionage objectives, as evidenced by the recent boom in research
into watermarking to safeguard intellectual property. Steganography, like cryptography, will become more
important in the future for safe communication in the "digital world."

There are no comments for this item.

Log in to your account to post a comment.

Click on an image to view it in the image viewer

Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha