{"version":"1.0","provider_name":"UEM Jaipur Blog","provider_url":"https:\/\/uem.edu.in\/uem-jaipur-blog","title":"The Journey of Steganography - UEM Jaipur Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"AORxFQfVrl\"><a href=\"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/\">The Journey of Steganography<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/embed\/#?secret=AORxFQfVrl\" width=\"600\" height=\"338\" title=\"&#8220;The Journey of Steganography&#8221; &#8212; UEM Jaipur Blog\" data-secret=\"AORxFQfVrl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"&nbsp; Data has been working as distinct tool of procuring information. Since the era of 90\u2019s, human being is using data for transmitting or storing information. In the recent past modern technologies are implemented to make a shield and protect data from digital theft or malfunctions. But, even today the sense of insecurity works within &hellip; Continued","thumbnail_url":"https:\/\/uemgroup.s3.amazonaws.com\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg"}