ijaers social
google plus

International Journal of Advanced Engineering, Management and Science

A Brief study on Steganography techniques

( Vol-2,Issue-4,April 2016 )

Author(s): Kavitha K J, Pushpalatha O

Total View : 1084
Downloads : 164
Page No: 180-183
ijaems crossref doiDOI:


Steganography, security, integrity.


As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.

Cite This Article:
Show All (MLA | APA | Chicago | Harvard | IEEE | Bibtex)