Open Access   Article Go Back

Current Trends In Steganography

Kirti 1 , Parmod Sarowa2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 879-882, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.879882

Online published on Jul 31, 2018

Copyright © Kirti, Parmod Sarowa . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kirti, Parmod Sarowa, “Current Trends In Steganography,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.879-882, 2018.

MLA Style Citation: Kirti, Parmod Sarowa "Current Trends In Steganography." International Journal of Computer Sciences and Engineering 6.7 (2018): 879-882.

APA Style Citation: Kirti, Parmod Sarowa, (2018). Current Trends In Steganography. International Journal of Computer Sciences and Engineering, 6(7), 879-882.

BibTex Style Citation:
@article{Sarowa_2018,
author = {Kirti, Parmod Sarowa},
title = {Current Trends In Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {879-882},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2529},
doi = {https://doi.org/10.26438/ijcse/v6i7.879882}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.879882}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2529
TI - Current Trends In Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Kirti, Parmod Sarowa
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 879-882
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
344 371 downloads 120 downloads
  
  
           

Abstract

Steganography relies on volatility in order to perform information hiding inside apparently innocuous payloads. Steganography helps in create secure communication between two parties, without any mediator noticing the presence of the particular communication. Steganalysis is the parallel to steganography. A steganalyst tries to find out the presence of a covert communication between two parties and either modify their communication. Many different techniques are introduced to make communication more secure by using steganography. All of them are proven to be secure in there own way. Many new techniques are coming in existence from past few years. In this paper, we review the different techniques that has already introduced.

Key-Words / Index Term

Steganography, QR code, DWT, Bluetooth, Logistic Map , DNA

References

[1]. Rutuja Kakade, Nikita Kasar, Shruti Kulkarni, Shubham Kumbalpuri, Sonali Patil, Student, Associate Professor, Dept.of Computer Engineering, PCCOE, Maharashtra, India” Image Steganography and Data hiding in QR Code” International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 05 | May -2017, e-ISSN: 2395 -0056.
[2]. Divya Suryawanshi, Meetali Salvi, Soumya Pandey Terna Engineering College, Nerul, Navi Mumbai IT Department, Mumbai University, Image steganography for criminal cases, Volume 5, Issue 2 | ISSN: 2321-9939
[3]. Marwan Ali Albahar, Olayemi Olawumi, Keijo Haataja, Pekka Toivanen University of Eastern Finland, School of Computing, Kuopio Campus, “ A novel method for bluetooth pairing using steganography”International Journal on Information Technologies & Security, № 1 (vol. 9), 2017
[4]. Shuliang Sun,School of Electronics and Information Engineering, Fuqing Branch of Fujian Normal University, China,” A Novel Secure Image Steganography Using Improved Logistic Map and DNA Techniques”
https://www.researchgate.net/publication/317829911, Article • May 2017.
[5]. S. U. Maheswari and D. J. Hemanth, “Different methodology for image steganography-based data hiding: Review paper,” International Journal of Information and Communication Technology, vol. 7, issue 4/5, pp. 521-536, 2015.
[6]. X. Wangand and D. Luan, “A Novel Image Encryption Algorithm Using Chaos and Reversible Cellular Automata, Communications in Nonlinear Science and Numerical Simulation, Vol. 18, No. 11, pp. 3075-3085, November, 2013.
[7]. S.K. Yadav, Manish Dixit Dept.of Computer Engineering, Madhav Institute of technology and science, Gwalior, India “A comparative study for image steganography using Transformation Domain method” International journal of science and Engineering(IJCSE), Volume: 05 Issue: 06 | Jun -2017.
[8]. Rajesh Shah, Yashwant Singh Chouhan Christian eminent college, Indore (M. P.)India” Encoding of Hindi Text Using Steganography Technique” International Journal of Scientific Research in Comp c Research in Computer Science and Engineering Science and Engineering Science and Engineering Research Paper Vol-2, Issue-1 E-ISSN: 2320-7639