International Journal of Computer Science and Management Studies (IJCSMS)
As stated earlier the risk of the interception of data by intruder is higher in case of cryptography alone. Also the steganogrphy techniques alone can't support the well-defined abstracted form of data. Till now there are certain steganography techniques are developed which have their drawbacks. First method, random pixel manipulation technique chooses the pixels in random fashion based upon the key shared between two entities thus it increases the key management overhead. Additional security is required for key exchange. Second method, Stego color cycle technique uses various RGB channels to hide data in channels which makes detection of data easy as the way is systematic.