Open Access   Article Go Back

Analysis and Review of the Steganographic Techniques

H.A. Patil1 , P. Saxena2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 681-685, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.681685

Online published on Nov 30, 2018

Copyright © H.A. Patil, P. Saxena . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: H.A. Patil, P. Saxena, “Analysis and Review of the Steganographic Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.681-685, 2018.

MLA Style Citation: H.A. Patil, P. Saxena "Analysis and Review of the Steganographic Techniques." International Journal of Computer Sciences and Engineering 6.11 (2018): 681-685.

APA Style Citation: H.A. Patil, P. Saxena, (2018). Analysis and Review of the Steganographic Techniques. International Journal of Computer Sciences and Engineering, 6(11), 681-685.

BibTex Style Citation:
@article{Patil_2018,
author = {H.A. Patil, P. Saxena},
title = {Analysis and Review of the Steganographic Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {681-685},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3225},
doi = {https://doi.org/10.26438/ijcse/v6i11.681685}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.681685}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3225
TI - Analysis and Review of the Steganographic Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - H.A. Patil, P. Saxena
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 681-685
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
477 250 downloads 248 downloads
  
  
           

Abstract

Nowadays, the security associated with information over the web has turned into a significant issue. With the aim to take care of the issue, two fundamental procedures are utilized cryptography and Steganography. The two strategies are utilized for information security reason. Cryptography changes the type of the information and Steganography totally hides its core from the clients, aside from the proposed recipient. The steganography implies secured script while cryptography implies mystery composing. In this paper, a strategy is defined which joins these two techniques to give a more productive and successful outcome. In this paper, different steganographic methods have been analyzed. These methods include text hiding, audio hiding, file hiding and image hiding. This paper reviews and analyzes many existing digital image steganographic methods in both the spatial and transform domains.

Key-Words / Index Term

References

[1] S Zlii Li,Yang S. A. F. , Xian Y (2003),” A LSB Steganography Detection Algorithm”, The 14th IEEE 2003 International Symposium on Persona1,lndoor and Mobile Radio Communication Proceedings.pp.2780-2783.
[2] Anindya Sarkar, Member, IEEE, Upamanyu Madhow, Fellow,IEEE, and B.S.Manjunath, Fellow, IEEE, (2010) “Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography”, IEEE Transactions on Information Forensics and Security, Vol.5.No.2, pp.225-239.
[3] Jaswinder Kaur, Inderjeet & Manoj Duhan, (2009) “A Comparative Analysis of Steganographic Techniques”, International Journal of Information Technology and Knowledge Management, Vol. 2, No. 1, pp 191-194
[4] Mamta Juneja and Parvinder Singh Sandhu, (2013) “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424.
[5] Shamim Ahmed Laskar and Kattamanchi Hemachandran, (2013) “Steganography Based On Random Pixel Selection For Efficient Data Hiding”, IJCET, Vol.4, Issue 2, pp.31-44.
[6] M.B.Ould MEDENI and El Mamoun SOUIDI, (2010) “Steganography and Error Correcting Codes”, IJCSIS, Vol.8.No.8, pp147-149..
[7] Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using Last Two Bits of Pixel Values”, International Journal of Security, Vol.5 Iss. 2 pp. 51-61
[8] Parul, Manju, Dr. Harish Rohil, “Optimized Image Steganography using Discrete Wavelet Transform (DWT)”, International Journal of Recent Development in Engineering and Technology, ISSN 2347– 6435, Volume 2, Issue 2, February 2014). pp. 75-81.
[9] C.-H. Yang and M.-H. Tsai, (2010) “Improving Histogram-based Reversible Data Hiding by Interleaving Predictions”, IET Image Processing, Vol.4. Iss. 4 pp. 223-234
[10] Tanmay Bhattacharya, Manas Paul & Arindam Dasgupta (2009) “A Novel session Based Text Encryption & Hiding Technique Using Bit Level Cross Fold Transposition & Genetic Algorithm”, International Journal of Information Technology and Knowledge Management, Vol. 2, No.2, pp.419-423.
[11] Fahim Irfan et. Al.s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB ”, International Journal of EST.
[12] Keith L.Haynes, (2011) “Using Image Steganography to Establish Covert Communication Channels”, International Journal of Computer Science and Information Security, Vol 9, No.9, pp. 1- 7.
[13] Sunny Dagar, “Highly Randomized Image Steganography using Secret Keys”, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India.
[14] D.P.Gaikwad and S.J.Wagh, (2010) “Colour Image Restoration For An Effective Steganography”, I-mar‟s Journal on Software Engineering, Vol.4 .No.3, pp.654
[15] Hemalatha.S, U.Dinesh Acharya and Renuka.A, (2013) “Comparison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCBCR domains”, International Journal of Advanced Information Technology, Vol.3, No.3, pp.1-9.