A COMPARATIVE ANALYSIS OF DIFFERENT TECHNIQUES OF STEGANOGRAPHY

Dr. Arpana Bharani

Abstract


The art of storing the data has got much consideration in the ongoing years as security of digital data has got a major concern in this age of internet. As sharing of sensitive and important data through a typical communication channel has turned out to be unavoidable, Steganography which is a part of concealing data has got a major consideration. Nowadays we are enclosed by various communication forms, where individuals of different types are transmitting data as honest as a entering credit card number to an online-store and as treacherous as a terrorist to plan a hijack. Steganography derives from the Greek word steganos, meaning covered or secret, and graphy (writing or drawing) [1]. Steganography is a technique where data compression, data hypothesis, spread spectrum, and cryptography advancements techniques are united to fulfill the requirement for security on the Internet. This paper is aimed to analyze the different procedures utilized in steganography and to distinguish zones in which this procedure can be connected, with the goal that mankind can be profited.

Keywords: Digital data, Steganography, Spread spectrum, Cryptography


Full Text:

PDF

References


Eric Cole, Ronald D. Krutz, Consulting Editor (2003), Hiding in Plain Sight, Steganography and the Art of Covert Communication, Wiley Publishing, Inc.

S.Barve, , U. Nagaraj, and R.. Gulabani, “Efficient and Secure Biometric Image Stegnography using Discrete Wavelet Transform” International Journal of Computer Science & Communication Networks, 1(1), 96-99, 2011.

Johnson, N. and Jajodia, S. (1998) Exploring Steganography: Seeing the Unseen. IEEE Computer, 31, 26-34.

Stefan Katzenbeiser & Fabien A.P.Petitcolas(1999), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Computer Security series, Boston, London.

Piyush Goel, “Data Hiding in Digital Images: A Steganographic paradigm” Indian Institute of Technology, Kharagpur, May,2008.

Anjan Kumar Payra, “Steganology For The Computer Forensics Examiners-Steganography , Steganalysis, Sterilization Techniques For Security Issues”, Lambert Academic Publishing House, ISBN: 978-3-659-40336-1.

B.L. Gunjal, R.R. Manthalkar, “Discrete Wavelet Transform based Strongly Robust Watermarking Schemes for Information Hiding in Digital Images”, Third International Conference on Emerging Trends in Engineering and Technology, DOI 10.1109/ICETET.2010.12.

Chen, Po - Yueh, Ju Lin Hung, "A DWT based approach for image steganography." International Journal of Applied Science and Engineering 4, no. 3 (2006): 275 – 290

Ajit Danti, Preethi Acharya, “Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography”, IJCA Special Issue on “Recent Trends in Image Processing and Pattern Recognition” RTIPPR, 2010.

Khan K: Cryptology and the origins of spread spectrum. IEEE Spectrum 1984, 21: 70-80.

M. Kharazi, H.T. Sencar, and N. Memon. (2004, Apr.). “Image steganography: Concepts and practice.” WSPC/Lecture Notes Series: 9in x 6in, [On line], pp. 1-49. (PDF) Image Steganography Techniques: An Overview.

Anil Kumar,Rohini Sharma, “IA Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 7,pp 363-372,July 2013

T.Morkel,, J. H. P.Eloff, and M. S.Olivier, “An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA, 2005.

Johnson, N. and Jajodia, S. (1998) Exploring Steganography: Seeing the Unseen. IEEE Computer, 31, 26-34.

ImageStegnography,https://en.wikipedia.org/wiki/Steganography


Refbacks

  • There are currently no refbacks.