Steganography: Camouflaging Sensitive and Vulnerable Data

2021 
Information is the backbone of today’s world. It acts as a base, on which all technologies stand upon firmly. Maintaining the secrecy of information is very crucial, especially if its content is sensitive. A huge number of researchers are continuously trying to bring up newer techniques of hiding data. In this paper, we have put together several efficient techniques of hiding information. These serve to be a relief to those for whom data hiding is not anymore optional. By hiding the crucial data, it gives a one-step protection from the third parties, who might try to attack. The attacker could be either active or passive. The steganography techniques camouflage the sensitive data or information totally so that it keeps such attackers at bay. This is because it doesn’t draw any attention from the third-party sources and that they stay supposedly clueless about any secret communication that might be taking place. For a steganographic method to be efficient, they must satisfy some criteria that are absolutely necessary. The three criteria are payload, robustness, and security. A good steganographic methodology must maintain a trade-off between the three stated criteria.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    40
    References
    0
    Citations
    NaN
    KQI
    []