Affiliation:
1. GLA University, India
2. The Bhawanipur Education Society College, Kolkata, India
3. Haldia Institute of Technology, India
4. University College Cork, Ireland
Abstract
In this digital era, most of the daily works of users are captured in digital forms like image, audio, video, or even text. These may contain sensitive, confidential, or private information as well. To keep these, there are different techniques exercised over the years like chest, coffer, repository, treasury, etc. Sometimes such ways of hiding information attract unintended users. Therefore, steganography has been applied to digital objects in a new form called digital steganography. This chapter enforces identifying methods in digital steganography. The basic model of any type of digital steganography is composed of three types of objects: cover object, text to be hidden, and stego object. Depending on the type of cover object, different types of digital steganography methods have been defined. Only data hiding in text is discussed.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluation of E store Business using TOPSIS MCDM Method;2023 1st International Conference on Cognitive Computing and Engineering Education (ICCCEE);2023-04-27
2. Carpooling Solutions Using Machine Learning Tools;Advanced Research and Real-World Applications of Industry 5.0;2023-02-24
3. Hybrid Cryptography and Steganography Method to Provide Safe Data Transmission in IoT;Proceedings of Data Analytics and Management;2023
4. Technological Innovation Driven by Big Data;Advanced Bioinspiration Methods for Healthcare Standards, Policies, and Reform;2022-11-18
5. Identifying Disease and Diagnosis in Females Using Machine Learning;Encyclopedia of Data Science and Machine Learning;2022-10-14