Loading

A Review on Steganographic Techniques
Avni Singh Chauhan1, Shreedhar Agarwal2
1Avni Singh Chauhan, IIIrd year, Department of Computer Science, Bachelor of Technology, JECRC University, Jaipur, India.
2Shreedhar Agarwal, IIIrd year, Department of Electronics and Communication Engineering, Bachelor of Technology, LNM Institute of Information and Technology, Jaipur, India.
Manuscript received on May 08, 2015. | Revised Manuscript received on May 20, 2015. | Manuscript published on June 15, 2015. | PP: 4-6 | Volume-3 Issue-7, June 2015. | Retrieval Number: G0883063715/2015©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Steganography is the art of coveting data through which the sensitive information can be secured by covering it through a compatible media. Steganegraphy focuses on the existence of the cover media through which the data can’t be accessed illegitimately. The paper provides a spectral view on the basic implementation and the various steganographic techniques. Here we profoundly deal with transmission techniques of tender data so as to make the system more reliable and robust.
Keywords: Steganograpgy, LSB, DCT, DWT, CNF, GNF, PSNR, Pseudorandom sequence.