An Approach for Steganography in Security Systems
M. Angulakshmi1, M. Deepa2, M. B. Benjulaanbumalar3, K. Santhi4, M. Lawanyashri5

1M. Angulakshmi, School of Information Technology and Engineering, VIT, Vellore (Tamil Nadu), India.
2M. Deepa, School of Information Technology and Engineering, VIT, Vellore (Tamil Nadu), India.
3M. B. Benjulaanbu Malar, School of Information Technology and Engineering, VIT, Vellore (Tamil Nadu), India.
4K. Santhi, School of Information Technology and Engineering, VIT, Vellore (Tamil Nadu), India.
5M. Lawanyashri, School of Information Technology and Engineering, VIT, Vellore (Tamil Nadu), India.
Manuscript received on 20 May 2019 | Revised Manuscript received on 06 June 2019 | Manuscript Published on 15 June 2019 | PP: 238-241 | Volume-8 Issue-1S2 May 2019 | Retrieval Number: A00550581S219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Techniques for hiding secret data or information play an important role with the rapid growth of multimedia content transfer and secret communications of data. Steganography is the art of hiding data or information in such a ways that prevent detection. Steganography is used for transferring hidden data in an appropriate carrier like audio, video, image etc from one place to other place through public channel. Many different carrier files can be used like audio, video, TCP/IP header file, but digital images are the most popular because images are used very frequency on internet now days. For hiding secret data or message in images, there is a large variety of Steganography techniques available and all of them have respective strong points and weak points. Different applications used for steganography technique have different requirements. In this paper we survey different steganography techniques for hiding the secret data and prosed a method by combining different methods.
Keywords: Audio , Image, Steganography, Text, Video.
Scope of the Article: Security and Privacy