GB Pant Engineering College: Steganography Advancements Using Information Technology
GB Pant Engineering College: Steganography Advancements Using Information Technology
GB Pant Engineering College: Steganography Advancements Using Information Technology
So now when we try to send the word “MISSISSIPI RIVER” it needs only 46 bits
instead of 136 bits , after Huffman coding . Similarly we can decompress the
message .
Encryption/Decompression
Algorithms
Step2
Step3
Step4
Step5
Public Key Algorithm
Step1
Step2
Step3
Step4
Step5
Step6
Step7
HASH Functions
Hashing is used with a database to enable items to be
retrieved more quickly. Hashing can also be used in the
encryption and decryption of digital signatures.
• Darshana Patil, Prof. P.M. Chawan. "A secure data communication using enhanced Cryptography and
Steganography." International Journal of Innovative Research in Computer and Communication
Engineering , June 2017.
• Mamta Juneja, Parvinder Singh Sandhu. "A new approach for Information Security using an Improved
Steganography Technique." J Inf Process Syst, September 2013: Vol.9, No.3.
• Mandy Douglas, Karen Bailey,Mark Leaney,Kevin Curran. "An overview of steganography techniques
applied for the protection of biometric data." Multimedia tools and applications, July 2018: 17333–17373.
• Sarita Nain, Sunil Kumar. "Steganography and its various techniques." International Journal of Enhanced
Research in Science Technology & Engineering, June-2014: Vol. 3 Issue 6.
THANK YOU