Abstract

AbstractThe main aim of this article is to develop a basic framework for different steganography techniques in real-time applications. Today, as the utilization of the Internet expands, security is gaining momentum. Steganography is a strategy for camouflage confidential data behind an innocent cover record, so that all subtitles are not known. The most effective method to ensure data information to utilize the idea of steganography. The aim of steganography is separated into a few types. In this study report, we will examine main sorts of steganography, by taking a gander at the cover record as initial step—basic to all classifications, we will talk about text, image, speech, and video steganography. Steganography text is an interaction that utilizes at text cover. We will go with line change, how to change names, syntactic strategy, and favored technique for covering. Coming to speech steganography, it contains LSB coding, encoding segment, spread spectrum, echo hiding techniques, and speech steganography utilizing fast Fourier transforms. The idea of video steganography is utilized to shroud data behind the scenes of video outlines. The concept of steganography and cryptography security principles is given in information. Strategy used to implant LSB information on paper. Video steganography can shroud a lot of information in a basic and compelling manner, and we will utilize a wide range of steganographic techniques. Along these lines, the test proof demonstrates the adequacy of the covering technique in speech steganography. In this way, we will actually want to recover classified data for somewhat quality corruption utilizing steganographic decoder concept.KeywordsSteganographyText steganographyImage steganographySpeech steganographyVideo steganographySpatial domainLSBJPEGDFTDCTLine shiftingWord shiftingEcho hidingPhase codingWavelet and FFT using DWTSpread spectrum and fast Fourier transforms

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.