Advisor to Chancellor, JIS University, India
*Corresponding author: Samir Kumar Bandyopadhyay, Advisor to Chancellor, JIS University, India, Email: email@example.com
Submission: December 11, 2017; Published: February 15, 2018
ISSN : 2576-8816Volume3 Issue4
All security techniques try to maintain Confidentiality, Integrity and Availability- referred to as the CIA Triad of information security. Steganography also takes a real challenge in the field of security through data concealment. A Steganography System consists of two functions: embedding and extraction. The objective of the proposed work is to design robust algorithms which generate stego media, can carry large amount (capacity) of secret data without reducing imperceptibility.