Introduction: Nowadays the Internet is used by people from different walks of life, who are facing more challenges in terms of data storage and transmission which in turn increases the number of users on the network therefore considerably. In the advanced world, information is increasingly essential to the exchange of workplaces and the heart of the world economy. To ensure information security, the idea of concealment has pushed people to come up with imaginative and innovative responses to protect information from falling into the wrong hands. The spread of advanced media has faced a problem for many years as information is affected and controlled by unapproved individuals. The web is a correspondence strategy as a method of appropriating data to the masses. As a result of the spread of the Internet throughout the world, the memorization of secret messages through particular techniques is expanded. Step by step data hiding strategies are expanding with more complex methodologies. Images, features, content, etc. are used in correspondence with mysterious messages in advanced media. steganography and cryptography are distinctive types of strategies used to send secure transmissions of information. Steganography is the skill and art of hiding information in distinct bearer documents, such as images, features, sounds, content, and so on. In cryptography, there is a degree of degree to find out the mysterious message we send from a stranger (attacker). In any case, in steganography, discovering the mysterious message is not so simple. This way, only the sender and recipient realize that the message exists. It does not attract unwanted considerations. The mysterious message that the sender exchanges...... middle of paper ...... works CitedPeter, Gregory. CISSP Guide to Security Essentials. (accessed May 1, 2014).2. Jack Lacy, Schuyler R. Quackenbush, Amy Reibman, James H. Snyder, “Intellectual Property Protection Systems and Digital Watermarking,” 2nd Workshop on Information Hiding, 1998. (accessed May 1, 2014).3. Ross Anderson, Roger Needham, Adi Shamir, "The Steganographic File System", 2nd Information Hiding Workshop, 1998. (accessed May 1, 2014).4. Atul Kahate, “Cryptography and Network Security,” third edition. (accessed 1 May 2014)5. Neil F. Johnson, Sushil Jajodia, George Mason University, “Exploring Steganography: Seeing the Unseen,” IEEE Computers, February 1998. (accessed May 1, 2014).6. "webpedia". http://www.webopedia.com/TERM/S/steganography.html (accessed May 1, 2014).7. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdf (accessed May 1, 2014)
tags