Abstract

Information hiding techniques have recently turned out to be critical in many applications. Text message, a digital sound recording, movie, as well as images tend to be progressively equipped using distinct nevertheless imperceptible grades, which might include a hidden copyright notice as well as assistance to prevent unauthorized replicating immediately. Many analysts will work in data disappearing techniques employing unique suggestions and regions to cover their secret files. In this paper we present a theoretical performance analysis for some basic method of text based Steganography techniques, audio files, portable executable files, and digital images, then we compare between them according to their performance using some evaluation parameters to accomplish the goal of reduces the chances of error and enhances security measures.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.