{"id":299,"date":"2020-06-05T17:51:11","date_gmt":"2020-06-05T17:51:11","guid":{"rendered":"https:\/\/uem.edu.in\/blog\/?p=299"},"modified":"2020-06-06T11:32:44","modified_gmt":"2020-06-06T11:32:44","slug":"the-journey-of-steganography","status":"publish","type":"post","link":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/","title":{"rendered":"The Journey of Steganography"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Data has been working as distinct tool of procuring information. Since the era of 90\u2019s, human being is using data for transmitting or storing information. In the recent past modern technologies are implemented to make a shield and protect data from digital theft or malfunctions. But, even today the sense of insecurity works within us, even for opening an application related our bank account or other security deposits.\u00a0 My principal motive as an Assistant Professor of Computer Science, at The University of Engineering &amp; Management, Jaipur is to flame a light on a technique which is protecting our data system from the past .<\/p>\n<p><strong>Steganography<\/strong>\u00a0is the method of hiding secret data within a simple, non-secret, file or message in order to avoid exposure; the secret data is then extracted at its destination.<\/p>\n<p>Let me explain you in very simple words, steganography is the technology which hides your information in another informative object , for example :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-300\" src=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg\" alt=\"\" width=\"300\" height=\"139\" srcset=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg 300w, https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA.jpg 601w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>In the above image of Monalisa\u2019s vision is focused and if you see it properly, you can find out the 0,1 sequence in her eyes. Here you can see that one object is a digital image and another object is a binary number. The combination of both develops the concept of\u00a0 steganoraphy. The object can be anything like an audio file, video file, text file or image file.<\/p>\n<p>Let me throw a light on the background of steganography dated way back in 440 B.C.<\/p>\n<ol>\n<li><strong>Wax Tablets: <\/strong>In ancient Greece, people wrote secret messages on wood and then they were covered with Wax.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong style=\"font-size: 1rem\">2. Shove Heads: <\/strong><span style=\"font-size: 1rem\">This was also used back in ancient Greece. Slaves were hired, their heads were completely shaved and a message was written secretly on their scalp. Following this, the slaves were given time to grow their hair till the message was covered. The slave was then delivered to a recipient who used to shove their heads again to find the message \u00a0.\u00a0 You can see in the image with a written text on the scalp.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-302\" src=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-2-300x132.jpg\" alt=\"\" width=\"300\" height=\"132\" srcset=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-2-300x132.jpg 300w, https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-2.jpg 351w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><strong>3.I<\/strong><strong style=\"font-size: 1rem\">nvisible Ink: <\/strong><span style=\"font-size: 1rem\">Secret messages were written using invisible ink which became visible only when the paper carrying the message was heated. Liquids such as milk, vinegar and fruit juices were used as Invisible inks.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-303\" src=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-3-300x148.jpg\" alt=\"\" width=\"300\" height=\"148\" srcset=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-3-300x148.jpg 300w, https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-3.jpg 423w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><strong>4.M<\/strong><strong style=\"font-size: 1rem\">orse code: <\/strong><span style=\"font-size: 1rem\">Secret messages were written in Morse code on the knitting yarn. A cloth was made out ofthe yarn which was worn by the carrier. For example Jeremiah Denton (<\/span><a style=\"font-size: 1rem\" href=\"https:\/\/en.wikipedia.org\/wiki\/United_States_Senate\">S. Senator<\/a><span style=\"font-size: 1rem\">representing\u00a0<\/span><a style=\"font-size: 1rem\" href=\"https:\/\/en.wikipedia.org\/wiki\/Alabama\">Alabama<\/a><span style=\"font-size: 1rem\">\u00a0from 1981 to 1987, a\u00a0<\/span><a style=\"font-size: 1rem\" href=\"https:\/\/en.wikipedia.org\/wiki\/United_States_Navy\">United States Navy<\/a><span style=\"font-size: 1rem\">\u00a0<\/span><a style=\"font-size: 1rem\" href=\"https:\/\/en.wikipedia.org\/wiki\/Rear_Admiral_(United_States)\">Rear Admiral<\/a><span style=\"font-size: 1rem\">, and\u00a0<\/span><a style=\"font-size: 1rem\" href=\"https:\/\/en.wikipedia.org\/wiki\/Naval_Aviator\">Naval Aviator<\/a><span style=\"font-size: 1rem\">\u00a0<\/span><a style=\"font-size: 1rem\" href=\"https:\/\/en.wikipedia.org\/wiki\/Prisoner_of_War\">taken captive<\/a><span style=\"font-size: 1rem\">\u00a0during the\u00a0<\/span><a style=\"font-size: 1rem\" href=\"https:\/\/en.wikipedia.org\/wiki\/Vietnam_War\">Vietnam War<\/a><span style=\"font-size: 1rem\">. ) blinked his eyes in Morse code to spellthe word \u2015Torture\u2016 in a Television conference. This ensured the US Military that American POWswere tortured in North Vietnam.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-304\" src=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-4-300x110.jpg\" alt=\"\" width=\"300\" height=\"110\" srcset=\"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-4-300x110.jpg 300w, https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-4.jpg 457w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>So this is the brief historical journey of Steganography, which has evolved as a tool for maintaining secrecy and value of confidentiality.<\/p>\n<p>To know more about the techniques you can visit our website <a href=\"https:\/\/uem.edu.in\/uem-jaipur\/\">https:\/\/uem.edu.in\/uem-jaipur\/<\/a> and you can follow us on<\/p>\n<p>Facebook<a href=\"https:\/\/business.facebook.com\/uemjpr\/?business_id=461551720675755\">https:\/\/business.facebook.com\/uemjpr\/?business_id=461551720675755<\/a>and Instagram<a href=\"https:\/\/www.instagram.com\/uemofficial\/\">https:\/\/www.instagram.com\/uemofficial\/<\/a>.<\/p>\n<p><strong><em>Works Cited<\/em><\/strong><\/p>\n<ol>\n<li><strong><em>Ravi K Sheth, Rashmi M. Tank \u201cImage Steganography Techniques\u201d International Journal of Computer Engineering and Sciences(IJCES) Volume-1 Issue-2, 2015,ISSN: &#8211; 2394-6180(online) <a href=\"http:\/\/www.knowledgecuddle.com\">www.knowledgecuddle.com<\/a>.<\/em><\/strong><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong><em>Kelvin Salton \u201cSteganography: Hiding an image inside another\u201d<a href=\"https:\/\/towardsdatascience.com\/steganography-hiding-an-image-inside-another-77ca66b2acb1\">https:\/\/towardsdatascience.com\/steganography-hiding-an-image-inside-another-77ca66b2acb1<\/a><\/em><\/strong><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Thank You!<\/strong><\/p>\n<blockquote><p><strong>Prof. Jyoti Khandelwal,<\/strong><br \/>\n<strong>Department of CSE,<\/strong><br \/>\n<strong>University of Engineering &amp; Management (UEM), Jaipur<\/strong><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Data has been working as distinct tool of procuring information. Since the era of 90\u2019s, human being is using data for transmitting or storing information. In the recent past modern technologies are implemented to make a shield and protect data from digital theft or malfunctions. But, even today the sense of insecurity works within &hellip; <a href=\"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/\">Continued<\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-299","post","type-post","status-publish","format-standard","hentry","category-uncategorized","wpautop"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Journey of Steganography - UEM Jaipur Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Journey of Steganography - UEM Jaipur Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Data has been working as distinct tool of procuring information. Since the era of 90\u2019s, human being is using data for transmitting or storing information. In the recent past modern technologies are implemented to make a shield and protect data from digital theft or malfunctions. But, even today the sense of insecurity works within &hellip; Continued\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/\" \/>\n<meta property=\"og:site_name\" content=\"UEM Jaipur Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-05T17:51:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-06T11:32:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uemgroup.s3.amazonaws.com\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"The Journey of Steganography\",\"datePublished\":\"2020-06-05T17:51:11+00:00\",\"dateModified\":\"2020-06-06T11:32:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/\"},\"wordCount\":567,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/media.uem.edu.in\\\/uploads\\\/sites\\\/7\\\/2020\\\/06\\\/MONALISA-300x139.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/\",\"name\":\"The Journey of Steganography - UEM Jaipur Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/media.uem.edu.in\\\/uploads\\\/sites\\\/7\\\/2020\\\/06\\\/MONALISA-300x139.jpg\",\"datePublished\":\"2020-06-05T17:51:11+00:00\",\"dateModified\":\"2020-06-06T11:32:44+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/media.uem.edu.in\\\/uploads\\\/sites\\\/7\\\/2020\\\/06\\\/MONALISA-300x139.jpg\",\"contentUrl\":\"https:\\\/\\\/media.uem.edu.in\\\/uploads\\\/sites\\\/7\\\/2020\\\/06\\\/MONALISA-300x139.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/the-journey-of-steganography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Journey of Steganography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/#website\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/\",\"name\":\"UEM Jaipur Blog\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur-blog\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Journey of Steganography - UEM Jaipur Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/","og_locale":"en_US","og_type":"article","og_title":"The Journey of Steganography - UEM Jaipur Blog","og_description":"&nbsp; Data has been working as distinct tool of procuring information. Since the era of 90\u2019s, human being is using data for transmitting or storing information. In the recent past modern technologies are implemented to make a shield and protect data from digital theft or malfunctions. But, even today the sense of insecurity works within &hellip; Continued","og_url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/","og_site_name":"UEM Jaipur Blog","article_published_time":"2020-06-05T17:51:11+00:00","article_modified_time":"2020-06-06T11:32:44+00:00","og_image":[{"url":"https:\/\/uemgroup.s3.amazonaws.com\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#article","isPartOf":{"@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/"},"author":{"name":"","@id":""},"headline":"The Journey of Steganography","datePublished":"2020-06-05T17:51:11+00:00","dateModified":"2020-06-06T11:32:44+00:00","mainEntityOfPage":{"@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/"},"wordCount":567,"commentCount":0,"image":{"@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#primaryimage"},"thumbnailUrl":"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/","url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/","name":"The Journey of Steganography - UEM Jaipur Blog","isPartOf":{"@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#primaryimage"},"image":{"@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#primaryimage"},"thumbnailUrl":"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg","datePublished":"2020-06-05T17:51:11+00:00","dateModified":"2020-06-06T11:32:44+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#primaryimage","url":"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg","contentUrl":"https:\/\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/MONALISA-300x139.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/the-journey-of-steganography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uem.edu.in\/uem-jaipur-blog\/"},{"@type":"ListItem","position":2,"name":"The Journey of Steganography"}]},{"@type":"WebSite","@id":"https:\/\/uem.edu.in\/uem-jaipur-blog\/#website","url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/","name":"UEM Jaipur Blog","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uem.edu.in\/uem-jaipur-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"","url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/author\/"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":186,"url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/developing-an-automatic-and-secure-cloud-instance-selection-platform-on-the-top-of-amazon-web-server-aws-using-automatic-anywhere-tool-aat\/","url_meta":{"origin":299,"position":0},"title":"Developing an automatic and secure cloud instance selection platform on the top of Amazon Web Server (AWS) using Automatic Anywhere Tool (AAT).","author":"","date":"May 5, 2020","format":false,"excerpt":"It is good to see that the students of UEM are trying their hands on different technical stuff and learning out of the box amidst this lockdown. The University of Engineering and Management, Jaipur has always tried to fabricate innovation and frame the essential components which could help the society\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/7\/2020\/05\/SHREYA-300x225.jpeg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":478,"url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/visible-light-communication-an-introduction\/","url_meta":{"origin":299,"position":1},"title":"Visible Light Communication- An Introduction","author":"","date":"June 23, 2020","format":false,"excerpt":"Wireless Communication has gone through several paradigm shifts and the idea of Visible Light Communication is nothing new. Fire and smoke signaling were used as a means of long-distance communications in ancient civilizations like the ancient Greeks, the Romans, Chinese and American Indians. In the early 1800s, the US military\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/paint-4-300x182.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":106,"url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/online-education\/","url_meta":{"origin":299,"position":2},"title":"ONLINE EDUCATION","author":"","date":"March 30, 2020","format":false,"excerpt":"In the recent past online education has become a trend to glorify study as the entire world is facing a tremendous hazard of a pandemic scenario. Educational institutions are stressing more and more on online education where direct face to face interaction can be avoided but the scope of virtual\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":233,"url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/uem-jaipur-conference\/","url_meta":{"origin":299,"position":3},"title":"UEM JAIPUR CONFERENCE","author":"","date":"May 28, 2020","format":false,"excerpt":"#CallForPapers #UEMJaipurConference #IEM_UEM_Group #IEMKolkata #UEMJaipur #UEMKolkata #UEMTopRankUniversity #IEMBestInstitute Conference website:- gcaia.uem.edu.in Paper submission link:- https:\/\/easychair.org\/conferences\/?conf=gcaia2020 =============== CALL FOR PAPERS =============== The ??? ?????? ?????????? ?? ?????????? ???????????? ??? ???????????? (????? ????) 8th-10th September, 2020, Jaipur, India || Technically sponsored by SPRINGER. ????:\/\/?????.???.???.??\/ GCAIA 2020 aims at providing a forum for\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/7\/2020\/05\/WhatsApp-Image-2020-05-27-at-9.34.55-PM-1-300x300.jpeg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":154,"url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/nirvyaja\/","url_meta":{"origin":299,"position":4},"title":"&#8220;nirvyAja&#8221;","author":"","date":"April 23, 2020","format":false,"excerpt":"Pandemic, Lockdowns, Social Distancing and Protection, these words are rotating around the globe for past few months. The human race has come to a standstill where survival now will largely depend on the awareness and informative essentialities among them. Due to the outspread of the COVID 19 or the Corona\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/7\/2020\/04\/image-1-218x300.jpeg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":486,"url":"https:\/\/uem.edu.in\/uem-jaipur-blog\/futuretronix-education\/","url_meta":{"origin":299,"position":5},"title":"Futuretronix Education","author":"","date":"June 24, 2020","format":false,"excerpt":"\u00a0 One night My 60 years old self inquired , \u2018Hey Mayukh\u00a0you became the best promising entrepreneur , still you are educating yourself, with full enthusiasm like the past.\u2019 I replied, Because till now, I am a true student of EEE\u00a0(Education -Engineering -Entrepreneurship) and an admirer of FE (Futuretronix Education)\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/7\/2020\/06\/paint-6-300x157.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/posts\/299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":5,"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":316,"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/posts\/299\/revisions\/316"}],"wp:attachment":[{"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uem.edu.in\/uem-jaipur-blog\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}