Tags: Research Paper Topics Criminal JusticeNumbering S In DissertationEssay How Can We Promote TourismArt Fo Gallery Museum Paper ResearchWrite An Essay ScholarshipsCreative Homework IdeasSaccharomyces Cerevisiae Research PaperEssay On The Rabbit Proof FenceWho Is The Main Character In The Book The Report CardAnd Listhesis
In 20, Yongfeng Huang and Shanyu Tang devised new steganographic algorithms that use codec parameters as cover object to realise real-time covert Vo IP steganography.
Academic work since 2012 demonstrated the feasibility of steganography for cyber-physical systems (CPS)/the Internet of Things (Io T).
Some techniques of CPS/Io T steganography overlap with network steganography, i.e.
This is totally review paper, in which we provide the comparison of available steganography technology hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography.  Shashikala Channalli, Ajay Jadhav, “Steganography An Art of Hiding Data” International Journal on Computer Science and Engineering Vol.1(3), 2009, 137-141  Morkel, Tayana, Jan HP Eloff, and Martin S. "A Novel Approach for Image Steganography Using Dynamic Substitution and Secret key. "A Review of Comparison Techniques of Image Steganography. “An Integrated Image Steganography System with Improved Image Quality." Applied Mathematical Sciences 7.71 (2013): 3545-3553.. "A Robust Image Steganography using DWT Difference Modulation (DWTDM)." International Journal of Computer Network & Information Security 4.7 (2012) .
The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego -image is transformed from spatial domain to the frequency domain. Artz, Donovan. " Global Journal of Computer Science and Technology 13.4 (2013) .  Saddaf rubab and M Younus article: Improved Image Steganography Technique for Colored Images using Wavelet Transform.
Published by Foundation of Computer Science, New York, USA.
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic.
Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny.
hiding data in communication protocols used in CPS/the Io T.
However, specific techniques hide data in CPS components.