Securing Data Using Steganography for Defense Safety

Authors

  • Gajawada Sai Maneeth Student, Department of Electronics and Computer Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India
  • Mohd. Arsalaan Student, Department of Electronics and Computer Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India
  • Nagaswaram Sai Preetham Student, Department of Electronics and Computer Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India
  • Attili Venkata Ramana Associate Professor, Department of Electronics and Computer Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India

Keywords:

cryptography, decryption, encryption, steganography

Abstract

In today’s international the artwork of showing the hidden statistics specially in public spots, has obtained extra interest and confronted many challenges. Thus, distinctive techniques were proposed thus far in hiding statistics in distinctive cowl media. It is widely known that encryption affords steady channels for speaking entities. However, because of loss of covertness on those channels, a dropper can perceive encrypted streams via statistical assessments and seize them for similarly cryptanalysis. Information hiding is a rising studies area, which encompasses programs consisting of copyright safety for virtual medium, marking, printing, and steganography. In watermarking programs, the message incorporates statistics consisting of proprietor identity and a virtual time stamp, which generally implemented for copyright safety. Fingerprint, the proprietor of the information set embeds a serial variety that uniquely identifies the consumer of the information set.

Downloads

Download data is not yet available.

Downloads

Published

22-06-2022

Issue

Section

Articles

How to Cite

[1]
G. S. Maneeth, M. Arsalaan, N. S. Preetham, and A. V. Ramana, “Securing Data Using Steganography for Defense Safety”, IJRESM, vol. 5, no. 6, pp. 204–207, Jun. 2022, Accessed: Nov. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2197