An Overview about a Milestone in Information Security: STEGANOGRAPHY
Keywords:
Steganography, Information security, Cryptography.Abstract
In the latest trend of booming technology across the world, Information Security is paved with major concern of evolution and invention. Information security do not focus securing information from unauthorized access but also provides an aid for preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The Original data that need to be processed can be physical or electrical one. Generally, Information Security program works on 3 objectives, commonly known as CIA triad– Confidentiality, Integrity, Availability. Along with many successful techniques to protect the data, the one technology that recently reverberated supporting the essence of information security is Steganography. The term Steganography is derived by a Greek word, having the context “art of concealing data into other data”. This paper provides further a broad insight of steganography and its methods.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Chandini M S
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.