Advancements in Modern Steganography Techniques for Enhanced Data Security: A Comprehensive Review
Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques like cryptography and steganography have developed in the fields of computer security for protecting sensitive data from unauthorized ac...
Saved in:
Published in | 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) pp. 941 - 944 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
Bharati Vidyapeeth, New Delhi
28.02.2024
|
Subjects | |
Online Access | Get full text |
DOI | 10.23919/INDIACom61295.2024.10498587 |
Cover
Abstract | Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques like cryptography and steganography have developed in the fields of computer security for protecting sensitive data from unauthorized access. The review paper explores modern steganography techniques, providing valuable information about their applications in data security. It analyzes the emerging field of DNA-based steganography. The paper also examines the dynamic domain of audio steganography, focusing on the challenge of developing strong, high-capacity systems for secure communication. Additionally, it focuses on evaluation of digital image steganography methods. |
---|---|
AbstractList | Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques like cryptography and steganography have developed in the fields of computer security for protecting sensitive data from unauthorized access. The review paper explores modern steganography techniques, providing valuable information about their applications in data security. It analyzes the emerging field of DNA-based steganography. The paper also examines the dynamic domain of audio steganography, focusing on the challenge of developing strong, high-capacity systems for secure communication. Additionally, it focuses on evaluation of digital image steganography methods. |
Author | Batra, Rashi Bohra, Shresty Naik, Charmi Kaur, Hargeet Popat, Kinshu |
Author_xml | – sequence: 1 givenname: Shresty surname: Bohra fullname: Bohra, Shresty email: shresty73@gmail.com organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India – sequence: 2 givenname: Charmi surname: Naik fullname: Naik, Charmi email: charminaik27@gmail.com organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India – sequence: 3 givenname: Rashi surname: Batra fullname: Batra, Rashi email: rashibatra78@gmail.com organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India – sequence: 4 givenname: Kinshu surname: Popat fullname: Popat, Kinshu email: kinshu.pce21@sot.pdpu.ac.in organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India – sequence: 5 givenname: Hargeet surname: Kaur fullname: Kaur, Hargeet email: hargeet.kaur13@gmail.com organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India |
BookMark | eNo1j8FPgzAchWuiB537Dzz04BVsaUtbb4RNJZmauHleCv0xmkjBwjD8986op3d63_veFTr3nQeEbimJE6apviteVkWWd21KEy3ihCQ8poRrJZQ8Q0stlWaKCM4F1ZeozOxkfAUt-HHAzuPnzkLweDvCwfjuEEzfzHgHVePd5xEGXHcBr33z07F4ZUaDt1Adgxvne5zh02wfoAE_uAnwG0wOvq7RRW0-Blj-5QK9P6x3-VO0eX0s8mwTOUr1GPGSnVSNKLXViTBWsxQopIRzzqw0jJXSSAmpIqSEsuaGVJxwWlNGlWWEsAW6-eU6ANj3wbUmzPv_6-wbVttViA |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.23919/INDIACom61295.2024.10498587 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEL IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9789380544519 9380544510 |
EndPage | 944 |
ExternalDocumentID | 10498587 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i119t-4b3024a5b9d925ad936e1e604443d7a33b7a77e6800bebf4a0c4041f1318d3003 |
IEDL.DBID | RIE |
IngestDate | Wed May 01 11:49:10 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-4b3024a5b9d925ad936e1e604443d7a33b7a77e6800bebf4a0c4041f1318d3003 |
PageCount | 4 |
ParticipantIDs | ieee_primary_10498587 |
PublicationCentury | 2000 |
PublicationDate | 2024-Feb.-28 |
PublicationDateYYYYMMDD | 2024-02-28 |
PublicationDate_xml | – month: 02 year: 2024 text: 2024-Feb.-28 day: 28 |
PublicationDecade | 2020 |
PublicationTitle | 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) |
PublicationTitleAbbrev | INDIACom |
PublicationYear | 2024 |
Publisher | Bharati Vidyapeeth, New Delhi |
Publisher_xml | – name: Bharati Vidyapeeth, New Delhi |
Score | 1.9217811 |
Snippet | Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 941 |
SubjectTerms | Audio steganography Computer security Cracking probability Digital images Discrete Cosine Transform DNA DNA steganography Focusing Image steganography Information security LSB Prisoners'problem Reviews RGB SNR Steganography Stego-Image Temporal Domain Transform Domain |
Title | Advancements in Modern Steganography Techniques for Enhanced Data Security: A Comprehensive Review |
URI | https://ieeexplore.ieee.org/document/10498587 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7Og3hSceJvctg1dWnSpvE23MYmOIRtsNtI0tQNoZPZXfzrfUlaRUHwVgr9wXt5fa953_c9hDomFl0nAEm4LGICi0KRjKaWxG63gdHEGi8p9DRJR3P-uEgWNVndc2GstR58ZiN36Hv5-cbs3FYZRDiXWZKJFmrBOgtkrQPU8XBmSeXdeNIf9yCOIGvLBP79Yh41l_wYnuJzx_AITZqnBsjIa7SrdGQ-fgky_vu1jlH7m6aHn78S0Anas-Up0r3Q1ffUNbwucZh2hqeVfVFlLVCNZ4106zuGqhUPypVHAuC-qhSe1jPt7nEPu-_F1q4CzB2HTkIbzYeD2cOI1IMUyJpSWRGuGdhCJVrmEryRS5ZaalMnFcdyoRjTQglhUygetdUFV13Du5wWFAI-ZxD3Z2i_3JT2HGFTGJoZIUQRSx7HcEeWFZTmUKQbAeXLBWo7Ay3fglbGsrHN5R_nr9Ch81MgiV-j_Wq7szeQ5it96937CZ0Hp8E |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA46QX1SceJv87DX1qVNm8a34SabbkXYBnsbSZq6IXQyuxf_ei9JqygIvpVCf3CX611z3_cdQi0VsLYRgPQozwMPFoXwEhJrLzC7DSGJtLKSQqM07k_p4yyaVWR1y4XRWlvwmfbNoe3lZyu1MVtlEOGUJ1HCttEOJH4aObrWLmpZQDMn_HaQdgcdiCTI2zyCv7-A-vVFP8an2OzxcIDS-rkONPLqb0rpq49fkoz_frFD1Pwm6uHnrxR0hLZ0cYxkx_X1LXkNLwvs5p3hcalfRFFJVONJLd76jqFuxb1iYbEAuCtKgcfVVLs73MHmi7HWCwd0x66X0ETTh97kvu9VoxS8JSG89KgMwRYikjzj4I-Mh7EmOjZicWHGRBhKJhjTMZSPUsuciraibUpyAiGfhRD5J6hRrAp9irDKFUkUYywPOA0CuGOY5IRkUKYrBgXMGWoaA83fnFrGvLbN-R_nb9BefzIazoeD9OkC7RufOcr4JWqU642-gqRfymvr6k-TbKsO |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+11th+International+Conference+on+Computing+for+Sustainable+Global+Development+%28INDIACom%29&rft.atitle=Advancements+in+Modern+Steganography+Techniques+for+Enhanced+Data+Security%3A+A+Comprehensive+Review&rft.au=Bohra%2C+Shresty&rft.au=Naik%2C+Charmi&rft.au=Batra%2C+Rashi&rft.au=Popat%2C+Kinshu&rft.date=2024-02-28&rft.pub=Bharati+Vidyapeeth%2C+New+Delhi&rft.spage=941&rft.epage=944&rft_id=info:doi/10.23919%2FINDIACom61295.2024.10498587&rft.externalDocID=10498587 |