Safety and Concealing Information Utilizing Combinatorial Data Hiding Proficiencies

Authors

  • Bhavsar Dharmeshkumar Bhalchandra Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.
  • Vishal Bhatnagar Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.
  • Richa Tomer Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.
  • Ravinder Singh Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.
  • Sudir Singh Saran Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.
  • Md Asadullah Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.
  • Md Shabbir Hassan Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.
  • Suphian Khan Department of Computer Science, Shri Venkateshwara University, Gajraula Distt- Amroha (U.P), India.

Keywords:

Steganography, Watermarking, Data.

Abstract

Steganography and Watermarking are proficiencies which forbid unauthorized users to have entry to the significant data. Though both has the same aim as Cryptography but with a different approach. The Steganography and digital watermarking provide methods which users may conceal and mingle their data amongst other data which made them unmanageable to recognize by attackers. Conveying secret data and establishing hidden relation has been a great interest. Steganography/watermarking and Encryption both pertains to the art and science of hiding a secret message in a cover media such as picture, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, we review certain proficiencies of steganography and digital watermarking and the difference these technologies have from Encryption proficiencies.

Downloads

Published

2014-12-31

How to Cite

Bhalchandra, B. D., Bhatnagar, V., Richa Tomer, Ravinder Singh, Sudir Singh Saran, Asadullah, M., Hassan, M. S., & Khan, S. (2014). Safety and Concealing Information Utilizing Combinatorial Data Hiding Proficiencies. International Journal of Recent Advances in Science and Technology, 1(1), 23–26. Retrieved from https://ijrast.com/index.php/ijrast/article/view/51