Information Security Using Steganography: A Review
Monika 1
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-8 , Page no. 321-324, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.321324
Online published on Aug 31, 2018
Copyright © Monika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Monika, “Information Security Using Steganography: A Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.321-324, 2018.
MLA Style Citation: Monika "Information Security Using Steganography: A Review." International Journal of Computer Sciences and Engineering 6.8 (2018): 321-324.
APA Style Citation: Monika, (2018). Information Security Using Steganography: A Review. International Journal of Computer Sciences and Engineering, 6(8), 321-324.
BibTex Style Citation:
@article{_2018,
author = {Monika},
title = {Information Security Using Steganography: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {321-324},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2696},
doi = {https://doi.org/10.26438/ijcse/v6i8.321324}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.321324}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2696
TI - Information Security Using Steganography: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Monika
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 321-324
IS - 8
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
444 | 319 downloads | 180 downloads |
Abstract
In modern era of communication there is lot of information exchange and every one need more and more secure communication. In order to provide secure communication stenography is widely used. The present paper provides conceptual framework on stenography that became basis for secure communication. Stenography is process of hiding secret information in any other message and provide secures communications. It consists of cover, hiding process, and un-hiding process along with channel on sender and receiver side. Stenography is implemented with the use of secret data in files. In first phase concept of stenography has been discussed & represents definition of stenography, working of stenography respectively. Existing research and benefits of stenography have been discussed in second phase respectively. Discussion has been made on designing techniques of stenography in order to enhance security. Next phase is considering challenges to existing researches have been explored in this paper. Such analysis would be beneficial to consider better enhancement in existing security mechanism. As there would be more probability of advance research if limitations of existing work is considered. At end of research in Last phase scope of research has been discussed.
Key-Words / Index Term
Steganography, Encryption, Decryption, Encoder, Decoder
References
[1] George Abboud (2010) Steganography & Visual Cryptography in Computer Forensics 2010 Fifth International Workshop.
[2] Sana Shiva et al (2015) Secure E-marketing Using Steganography & Emergence of Cryptography Journal of Computer Science & Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015, pg.532 – 538
[3] S. R. Navale1 (2015) Approach in case of Secure Online transaction using Visual Cryptography & Text Steganography, IJERT Vol. 4 Issue 03, March-2015
[4] Pradnya S. Nagdive (2015) Visual Cryptography & Steganography: A Review IJARCS & Management Studies Vol 3, Issue 1, January 2015
[5] Priyanka More, et al. (2016) Online Payment System using Steganography & Visual Cryptography, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 4, April-2016, pp. 157-161
[6] Souvik Roy et al., Online System to make Payment with the help of Steganography & Visual Cryptography, IEEE Conference on Electrical, Electronics & Computer Science, Jadavpur University, Kolkata, India. 2014.
[7] Thiyagarajan, et al. "Anti-Phishing Technique using Automated Challenge Response Method", in Proceedings of IEEE- International Conference on Communications & Computational Intelligence, 2010.
[8] N. Chou, et al. ‚Client-side defense against web-based identity theft,‛ in Proc. 11th Annu. Netw. Distribut. Syst. Secure. Symp, San Diego, CA, Feb. 2005.
[9] Anthony Y. Fu, Liu Wenyin, "Detection of Phishing Web Pages with Visual Similarity Assessment Based on EMD",IEEE Transactions on Dependable & Secure Computing, v 3,n 4, October/December 2006.
[10] S. Roy, P. Venkateswaran, “Online System to make Payment with the help of Steganography & Visual Cryptography”, IEEE Conference on Electrical, Electronics & Computer Science, vol. 6, no. 2, pp. 88-93, 2014
[11] M. Suresh, B. Domathoti, N. Putta, “Online Secure E-Pay Fraud Detection in E-Commerce System Using Visual Cryptographic Methods”, International Journal of Innovative Research in Computer & Communication Engineering ,vol. 3, no. 8, pp. 7519-7525, August 2015.
[12] Rahna E, V. Govindan, “A Novel approach to protech, Lossless Steganography using Unlimited Payload & Without Exchange Of Stegoimage”, International Journal of Advances in Engineering & Technology, vol. 6, no. 3, pp. 1263-1270, July 2013.
[13] R. C. Gonzalez & R. E. Woods," Digital Image Processing” Upper Saddle River, NJ: Prentice-Hall, 2006.
[14] [14] C. Chan, L, et al., “Data hinding in images with the help of LSB substitution Recognition of Pattern”, pp. 469– 474, August 2004.
[15] N. Shrivastava1 et al., “Survey on various mechanisms to make Image Steganography with enhanced Efficiency”, IJARC Engineering & Technology , vol. 4, no. 3, pp. 1005-1009, March 2015
[16] M. Kutter, S. Winkler, “A Vision-Based Masking Model for Spread-Spectrum Image Watermarking”, In proceedings International Conference on Computing, Electronics & Electrical Technologies, pp. 313-336, 2004.
[17] X. Li, et al., “A Generalization of Matching in case of LSB”, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, February 2009.
[18] P. Vaman, C. Manjunath, Sandeep , “Integration of Steganography & Visual Cryptography for Authenticity”, International Journal of Emerging Technology & Advanced Engineering, vol. 3, no. 6, pp. 80-84, June 2013
[19] C. Hegde , et al. , “Secure Authentication using Image/graphical Processing along with Visual Cryptography for Banking Applications”, in Conference of Advanced Computing & Communications, pp. 65-72,2013
[20] A. Suklabaidy a, et al., “Visual Cryptographic Applications”, International Journal on Computer Science & Engineering, vol. 5, no. 06, pp 455-464, June 2013.