{"title":"保密通信和秘密数据存储的隐写术","authors":"D. K. Chaudhary, Sandeep Srivastava, T. Choudhury","doi":"10.1109/ICGCIOT.2018.8753034","DOIUrl":null,"url":null,"abstract":"Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Steganography for Confidential Communication and Secret Data storage\",\"authors\":\"D. K. Chaudhary, Sandeep Srivastava, T. Choudhury\",\"doi\":\"10.1109/ICGCIOT.2018.8753034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.\",\"PeriodicalId\":269682,\"journal\":{\"name\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"volume\":\"15 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGCIOT.2018.8753034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2018.8753034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Steganography for Confidential Communication and Secret Data storage
Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.