Open Access   Article Go Back

A Review of Approaches for Steganography

K. Arora1 , G. Gandhi2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-5 , Page no. 118-122, May-2014

Online published on May 31, 2014

Copyright © K. Arora, G. Gandhi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Arora, G. Gandhi, “A Review of Approaches for Steganography,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.118-122, 2014.

MLA Style Citation: K. Arora, G. Gandhi "A Review of Approaches for Steganography." International Journal of Computer Sciences and Engineering 2.5 (2014): 118-122.

APA Style Citation: K. Arora, G. Gandhi, (2014). A Review of Approaches for Steganography. International Journal of Computer Sciences and Engineering, 2(5), 118-122.

BibTex Style Citation:
@article{Arora_2014,
author = {K. Arora, G. Gandhi},
title = {A Review of Approaches for Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {118-122},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=170},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=170
TI - A Review of Approaches for Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - K. Arora, G. Gandhi
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 118-122
IS - 5
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3453 3470 downloads 3621 downloads
  
  
           

Abstract

Steganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper�s suspicion. Many different carrier file formats are used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

Key-Words / Index Term

Steganography, image-audio-video-text Steganography

References

[1] N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26�34.
[2] J.C.Judge, Steganography: past, present, future. SANS Institute publication, , 2001
[3] F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn:�Information Hiding- A Survey�, Process of IEEE, vol.87,no.7, pp.1062-1078, July, 1999.
[4] Artz D (2001). �Digital steganography: hiding data within data� Internet Computing. IEEE, 5(3): 75-80 [5] Derek Upham, Jsteg, http://zooid.org/ Paul/crypto/jsteg.
[6] Nassir Memon R. Chandramouli. Analysis of lbs. based image steganography techniques. In Proceedings of IEEE ICIP, 2001.
[7] R. Chandramouli, Nassir Memon, �Analysis of LSB Based Image Steganography Techniques�, IEEE 2001. [8] K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, Steganalysis of quantization index modulation data hiding, Proc. of 2004 IEEE International Conference on Image Processing, vol. 2, pp. 1165-1168, 2004.
[9]Jar no Mielikainen, "LSB Matching Revisited", Signal Processing Letters, IEEE, Publication Date: May 2006 Volume : 13, Issue : 5, pp. 285- 287
[10] K. Gopalan. Audio steganography using bit modification. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP �03), volume 2, pages 421�424, 6-10 April 2003.
[11] N. Johnson, Survey of Steganography Software, Technical Report, January 2002.
[12] W. Peter. Disappearing Cryptography: Information Hiding: Steganography and watermarking (second edition). San Francisco: Margan Kaufmann.
[13] Johnson, N.F. & Jajodia, S., �Exploring Steganography: Seeing the Unseen�, Computer Journal, February 1998.
[14] Krenn, R., �Steganography and Steganalysis�, http://www.krenn.nl/univ/cry/steg/article.pdf