2019
DOI: 10.31142/ijtsrd23556
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Stegnography Data Hiding using Color Images

Abstract: Nowadays, network has necessary roles for transferring knowledge accurately and quick from supply to a destination. The info isn't secure enough to transfer extremely confidential. The protection of data has become one in every of the principle challenges of resource sharing with electronic communication over network. Cryptography and Steganography square measure to strategies for shielding knowledge from intruders whereas transferring over an open channel network. Cryptography could be a technique to cipher k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
1
0
Order By: Relevance
“…The study-case system is examined and tested for two case studies as following. Case 1: Figure (7) shows a comparison between PI and PID based Ziegler Nichol method on the system output when a 3-phase to ground fault occurs at the terminal of the grid where the fault is applied at t= 1.0 sec and cleared after t=1.5 sec. The system output is represented by active power, voltage and duty cycle.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The study-case system is examined and tested for two case studies as following. Case 1: Figure (7) shows a comparison between PI and PID based Ziegler Nichol method on the system output when a 3-phase to ground fault occurs at the terminal of the grid where the fault is applied at t= 1.0 sec and cleared after t=1.5 sec. The system output is represented by active power, voltage and duty cycle.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Figure (1) shows the block diagram of DC microgrid system that contains PV panel coupled to the grid through boost converter. MPPT combines to DC/DC converter to produce the maximum power and inverter converts DC to AC [7]. The main objective of the overall system is to supplant AC power supply to the grid.…”
Section: Microgrid Modelingmentioning
confidence: 99%
“…Besides the watermarking techniques for protecting information, there is the steganography technique that is used with cryptography to maintain the information intact from hackers. Steganography and cryptography can play a very significant role in this field by providing two-level security (54,55). Many researchers have worked on the protection of data through combining steganography and cryptography techniques.…”
Section: Figure 2 Information Security Techniques and Branches (28)mentioning
confidence: 99%