{"title":"A survey on image steganography","authors":"Nidhi Menon, Vaithiyanathan","doi":"10.1109/TAPENERGY.2017.8397274","DOIUrl":null,"url":null,"abstract":"In many areas security systems are very popular as the technologies are increasing day-by-day. Using encryption and steganography information security can be achieved. In today's world, cryptography is most often associated with scrambling plaintext into ciphertext, then back again. In the presence of third parties, it is a practice for secure communication. From the past times to the present times to keep the confidential information secure has always been a major issue. Researchers always found it interesting developing secure techniques such that the data could reach from the sender to without revealing it to any third party. Hence many techniques were developed to securely transfer data and among them one is steganography. Steganography is a step farther to cryptography as it hides an encrypted message such that no one knows it exists. Its success depends on the secrecy of the action and if detected, the system will fail but security of data depends on the robustness of the applied algorithm.","PeriodicalId":237016,"journal":{"name":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"49","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TAPENERGY.2017.8397274","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 49
Abstract
In many areas security systems are very popular as the technologies are increasing day-by-day. Using encryption and steganography information security can be achieved. In today's world, cryptography is most often associated with scrambling plaintext into ciphertext, then back again. In the presence of third parties, it is a practice for secure communication. From the past times to the present times to keep the confidential information secure has always been a major issue. Researchers always found it interesting developing secure techniques such that the data could reach from the sender to without revealing it to any third party. Hence many techniques were developed to securely transfer data and among them one is steganography. Steganography is a step farther to cryptography as it hides an encrypted message such that no one knows it exists. Its success depends on the secrecy of the action and if detected, the system will fail but security of data depends on the robustness of the applied algorithm.