2009 International Conference on Advances in Recent Technologies in Communication and Computing 2009
DOI: 10.1109/artcom.2009.122
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Hindi Text Steganography by Shifting Matra

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…There are following types of steganography according to a medium that is used to hide data: Text, Audio, Video, and Image. Changder et al (2009) have presented a novel approach for Indian text steganography. In this technique, perceivable sentences are formed to hide the obscure message.…”
Section: Steganography Vs Cryptographymentioning
confidence: 99%
“…There are following types of steganography according to a medium that is used to hide data: Text, Audio, Video, and Image. Changder et al (2009) have presented a novel approach for Indian text steganography. In this technique, perceivable sentences are formed to hide the obscure message.…”
Section: Steganography Vs Cryptographymentioning
confidence: 99%
“…Steganography involves hiding information so that it appears that no information is hidden at all. The message can be hidden in images, audio files [1] or in text [2] [3].…”
Section: Introductionmentioning
confidence: 99%
“…To secure one to one communication, steganography is an important technique [3], the principle is that the third party must not have a hint of what is being transferred, Steganography enables information transfer in a covert manner such that it does not draw the attention of the unintended recipients [4]. The cover image is used to carry the secret message, because the human eyes are insensitive to very minute changes to the colours and hence, intelligently embeds the data and transmits it to the receiver [4][5][6]. When received, the data is securely retrieved by extraction.…”
Section: Introductionmentioning
confidence: 99%
“…Both Steganography and Cryptography are excellent means by which to accomplish this but neither technology alone is perfect and both can be broken. It is for this reason that most experts would suggest using both to add multiple layers of security [4].…”
Section: Introductionmentioning
confidence: 99%