National Conference on Latest Initiatives and Innovations in Communication and Electronics |
Foundation of Computer Science USA |
IICE2016 - Number 1 |
February 2017 |
Authors: Reetika Sodhi |
4ef5d8a2-7235-4f90-93ed-04e67e53addf |
Reetika Sodhi . A Review for Text Steganography Techniques for WSN. National Conference on Latest Initiatives and Innovations in Communication and Electronics. IICE2016, 1 (February 2017), 5-8.
In today's digitised era almost all data is transferred digitally which is very easy and advantageous but it also has some shortcomings i. e. the security of this data is very important. So different techniques such as steganography and cryptography are used to ensure security of data being sent over a medium. In steganography, the secret data is concealed within an object known as cover media which can be an image, audio/video, text so that the existence of any hidden data is not known to the third party or anyone who is not the intended receiver of that data. So in this paper discussion on some text steganography techniques is done with their merits and demerits.