Tags: Homework InThe Atom EssayCollege Essays About YourselfPhd Thesis Enterprise Risk ManagementOnline College Admission EssaysThesis Printing And Binding IrelandCar Business PlanAp Lit Essay TypesUsc Essay Application PromptEssay Writing Technique
The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change.
"Digital image Steganalysis for computer forensic investigation." Computer Science and Information Technology (CSIT) (2012): 161-168..  Hitesh Singh, Pradeep Kumar Singh, Kriti saroha “A Survey on Text Based Steganography” Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development, February 26 – 27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and Management, Ne w Delhi.  Dutta, Poulami, Debnath Bhattacharyya, and Tai-hoon Kim.
"An Integrated Image Steganography System with Improved Image Quality." Applied Mathematical Sciences 7.71 (2013): 3545-3553. "A Robust Image Steganography using DWT Difference Modulation (DWTDM)." International Journal of Computer network & Information Security 4.7 (2012).. Bennett, “Linguistic Steganography: survey, analysis, and robustness concerns for hiding information in text” center for Education and Research in Information Assurance and Security, Purdue University 2004. "Audio Steganography: A Survey on Recent Approaches." World Applied Programming 2.3 (2012): 202-205..
"Digital steganography: hiding data within data." internet computing, IEEE 5.3 (2001): 75-80. "Information hiding using steganography." Telecommunication Technology, 2003. International Journal of Computer Applications 39(14):29-32, February 2012.
 Hitesh Singh, Pradeep Kumar Singh, Kriti Saroha “A Survey on Text Based Steganography” Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development, February 26 – 27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and Management, Ne w Delhi  Jain, Nitin, Sachin Mesh ram, and Shikha Dubey. "Data hiding in audio signal: A review." International journal of database theory and application2.2 (2009): 1-8.. B.kekre , Archana Athawale , “Information Hiding In Audio Signal”.
Since the era of evolving network applications, steganography research has shifted from image steganography to steganography in streaming media such as Voice Over Internet Protocol (Vo IP). developed a data hiding technique leading to compressed forms of source video signals on a frame-by-frame basis.
is the first ever effort to improve the codebook partition by using Graph theory along with Quantization Index Modulation in low bit-rate streaming media.
 Nosrati, Masoud, Ronak Karimi, and Mehdi Hariri.
 Jenkins, Neil, and Jean Everson Martina "Steganography in audio." University of Cambridge CST Part II Dissertation (2009) ..
Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny.