Computer Science – Cryptography and Security
Scientific paper
2011-09-22
Computer Science
Cryptography and Security
4 pages, 4 figures; The Institution of Engineers (India) Journal, Vol 86, November 2005
Scientific paper
A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography is also discussed here.
Biswas Sudipto
Chakraborty Poulami
Ghosh Surjya
Mukherjee Animesh
Mukhopadhyay Debajyoti
No associations
LandOfFree
An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-262306