National Conference on Recent Trends in Information Technology |
Foundation of Computer Science USA |
NCIT2015 - Number 1 |
January 2016 |
Authors: Manashee Kalita, Themrichon Tuithung |
1eb2cfbc-66f4-4f8a-a328-7d9c6acae242 |
Manashee Kalita, Themrichon Tuithung . A Comparative Study of Steganography Algorithms of Spatial and Transform Domain. National Conference on Recent Trends in Information Technology. NCIT2015, 1 (January 2016), 9-14.
Transmitting data from sender to authorized receiver through a public media (insecure media) with full security is a challenging task. From the ancient time, different methods and techniques have been adopted to gain secure transmission of information. With the development of new technologies, the techniques used for securing information have also changed. The three main technology used for securing digital content are watermarking, steganography and cryptography. Watermarking and steganography can be considered under the same roof, i. e. data hiding techniques. In the last decade, steganography has drawn more attention of researchers. This paper presents a comparative study of steganography algorithms both in the spatial and transform domain.