{"title":"回顾和分析使用图像隐写术的数据安全性","authors":"Bharat Kapila, T. Thind","doi":"10.1109/iccakm50778.2021.9357730","DOIUrl":null,"url":null,"abstract":"Development innovation and speedy Network make it simple and monetary to spread data across the globe. This leads people to think about their safety and their jobs. Steganography is a methodology that stops unwanted consumers from going towards simple information. Steganography and sophisticated watermarking offer procedures for consumers to hide and blend their data with other details that makes it impossible for attackers to see them. In this paper the main purpose is to research a couple of steganography and mechanized watermarking systems in both spatial and repeat spaces.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Review and analysis of data security using image steganography\",\"authors\":\"Bharat Kapila, T. Thind\",\"doi\":\"10.1109/iccakm50778.2021.9357730\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Development innovation and speedy Network make it simple and monetary to spread data across the globe. This leads people to think about their safety and their jobs. Steganography is a methodology that stops unwanted consumers from going towards simple information. Steganography and sophisticated watermarking offer procedures for consumers to hide and blend their data with other details that makes it impossible for attackers to see them. In this paper the main purpose is to research a couple of steganography and mechanized watermarking systems in both spatial and repeat spaces.\",\"PeriodicalId\":165854,\"journal\":{\"name\":\"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccakm50778.2021.9357730\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccakm50778.2021.9357730","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review and analysis of data security using image steganography
Development innovation and speedy Network make it simple and monetary to spread data across the globe. This leads people to think about their safety and their jobs. Steganography is a methodology that stops unwanted consumers from going towards simple information. Steganography and sophisticated watermarking offer procedures for consumers to hide and blend their data with other details that makes it impossible for attackers to see them. In this paper the main purpose is to research a couple of steganography and mechanized watermarking systems in both spatial and repeat spaces.