Secured communication of text and audio using image steganography

M Anusha, KN Bhanu… - … Conference on Electronics …, 2020 - ieeexplore.ieee.org
Data security has gained an utmost importance due to the unprecedented increase in the
data generated over the internet, which is a basic necessity of any application in information …

Comparison of various routing and compression algorithms: a comparative study of various algorithms in wireless networking

S Preet, AK Luhach, R Luhach - … , SmartCom 2016, Jaipur, India, August 6 …, 2016 - Springer
Wireless networking is on the verge of boom these days. Many multinational companies are
trading in spectrum to provide data and voice services over wireless and mobile space. This …

Secured communication for multimedia based steganography

D Divyashree, KN Bhanu… - … Conference on Electronics …, 2020 - ieeexplore.ieee.org
Secured communication on sensitive information between two parties need to consider
information security as necessity. Steganography and cryptography can be used to enhance …

[PDF][PDF] Information hiding based on audio steganography using least significant bit

FS Mohamad, NSM Yasin - Int J Eng Technol, 2018 - academia.edu
Steganography is the idea of hiding private or sensitive data or information within something
that appears to be nothing out of the normal. A few problems arise especially in securing …

[PDF][PDF] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A REVIEW ON VARIOUS AUDIO STEGANOGRAPHY …

R Garg, V Laxmi - academia.edu
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message, a form …