0% found this document useful (0 votes)
47 views10 pages

A Survey Paper On Steganography Technique

This document summarizes a survey paper on steganography techniques. It begins with definitions of steganography as covering writing and discusses how it is used to hide secret messages in digital files like images, audio, video and text. It then focuses on image steganography, describing the terminology used including cover image, stego image and stego key. Different techniques for image steganography are classified including spatial domain methods, transform domain methods and distortion techniques. Spatial domain methods like LSB substitution and PVD are outlined. The document provides an overview of digital steganography and a survey of image steganography techniques.

Uploaded by

Linh Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views10 pages

A Survey Paper On Steganography Technique

This document summarizes a survey paper on steganography techniques. It begins with definitions of steganography as covering writing and discusses how it is used to hide secret messages in digital files like images, audio, video and text. It then focuses on image steganography, describing the terminology used including cover image, stego image and stego key. Different techniques for image steganography are classified including spatial domain methods, transform domain methods and distortion techniques. Spatial domain methods like LSB substitution and PVD are outlined. The document provides an overview of digital steganography and a survey of image steganography techniques.

Uploaded by

Linh Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

ISSN(Online): 2320-9801

ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

A Survey Paper on Steganography Techniques


Dr. Rajkumar L Biradar1, Ambika Umashetty2
Associate Professor, Dept. of Electronics and Telematics, G. Narayanamma Institute of Technology & Science,
Hyderabad, India1
Dept. of Computer Science & Engineering, Appa Institute of Engineering & Technology, Kalaburagi, India2

ABSTRACT: Steganography is going to gain its importance due to the exponential growth and secret communication
of potential computer users over the internet. It can also be defined as the study of invisible communication that usually
deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in
communication, image, text, voice or multimedia content for copyright, military communication, authentication and
many other purposes. In image Steganography, secret communication is achieved to embed a message into cover image
(used as the carrier to embed message into) and generate a stego-image (generated image which is carrying a hidden
message). In this paper we have critically analyzed various steganographic techniques and also have covered
steganography overview its major types, classification, applications.

KEYWORDS: Data hiding, Steganography, Cover writing

I. INTRODUCTION

Steganography word is originated from Greek words Steganós (Covered), and Graptos (Writing) which literally means
“cover writing” [22]. Generally steganography is known as “invisible” communication. Steganography means to
conceal messages existence in another medium (audio, video, image, communication). Today’s steganography systems
use multimedia objects like image, audio, video etc as cover media because people often transmit digital images over
email or share them through other internet communication application. It is different from protecting the actual content
of a message. In simple words it would be like that, hiding information into other information.

Steganography means is not to alter the structure of the secret message, but hides it inside a cover-object (carrier
object). After hiding process cover object and stego-object (carrying hidden information object) are similar. So,
steganography (hiding information) and cryptography (protecting information) are totally different from one another.
Due to invisibility or hidden factor it is difficult to recover information without known procedure in steganography.
Detecting procedure of steganography known as Steganalysis.

1.1. Steganography in Digital Mediums

Depending on the type of the cover object there are many suitable steganographic techniques which are followed in
order to obtain security. It can be shown in Figure 1.

1.1.1. Image Steganography: Taking the cover object as image in steganography is known asimage steganography.
Generally, in this technique pixel intensities are used to hide the information.

1.1.2. Network Steganography: When taking cover object as network protocol, such as TCP,UDP, ICMP, IP etc,
where protocol is used as carrier, is known as network protocol steganography. In the OSI network layer model there
exist covert channels where steganography can be achieved in unused header bits of TCP/IP fields [24].

1.1.3. Video Steganography: Video Steganography is a technique to hide any kind of files orinformation into digital
video format. Video (combination of pictures) is used as carrier for hidden information. Generally discrete cosine

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 721


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

transform (DCT) alter values (e.g., 8.667 to 9) which is used to hide the information in each of the images in the video,
which is not noticeable by the human eye. Video steganography uses such as H.264, Mp4, MPEG, AVI or other video
formats.

1.1.4. Audio Steganography: When taking audio as a carrier for information hiding it is calledaudio steganography. It
has become very significant medium due to voice over IP (VOIP) popularity. Audio steganography uses digital audio
formats such as WAVE, MIDI, AVI MPEG or etc for steganography.

1.1.5. Text Steganography: General technique in text steganography, such as number of tabs,white spaces, capital
letters, just like Morse code [21] and etc is used to achieve information hiding

Figure-1. Digital Medium to Achieve Steganography

1.2. Image Steganography Terminologies

Image steganography terminologies are as follows:-


• Cover-Image: Original image which is used as a carrier for hidden information.
• Message:Actual information which is used to hide into images. Message could be a plain text or some other image.
• Stego-Image: After embedding message into cover image is known as stego-image.
• Stego-Key: A key is used for embedding or extracting the messages from cover-imagesand stego-images.

Figure 2. Image Steganography

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 722


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

Generally image steganography is method of information hiding into cover-image and generates a stego-image. This
stego-image then sent to the other party by known medium, where the third party does not know that this stego-image
has hidden message. After receiving stego-image hidden message can simply be extracted with or without stego-key
(depending on embedding algorithm) by the receiving end [21]. Basic diagram of image steganography is shown in
Figure 2 without stego-key, where embedding algorithm required a cover image with message for embedding
procedure. Output of embedding algorithm is a stego-image which simply sent to extracting algorithm, where extracted
algorithm unhides the message from stego-image.

1.3. Image Steganography Classifications


1.4.
Generally image steganography is categorized in following aspects [23] and Table-1 shows the best steganographic
measures.

Table 1. Image Steganography Algorithm Measures

Measures Advantage Disadvantage


High Capacity High Low
Perceptual Transparency High Low
Robustness High Low
Temper Resistance High Low
Computation Complexity Low High

1.4. Image Steganographic Techniques

Image steganography techniques can be divided into following domains.

1.4.1. Spatial Domain Methods: There are many versions of spatial steganography, all directlychange some bits in the
image pixel values in hiding data. Least significant bit (LSB)-based steganography is one of the simplest techniques
that hides a secret message in the LSBs of pixel values without introducing many perceptible distortions. Changes in
the value of the LSB are imperceptible for human eyes. Spatial domain techniques are broadly classified into:
1. Least significant bit (LSB)
2. Pixel value differencing (PVD)
3. Edges based data embedding method (EBE)
4. Random pixel embedding method (RPE)
5. Mapping pixel to hidden data method

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 723


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

6. Labeling or connectivity method


7. Pixel intensity based method
8. Texture based method
9. Histogram shifting methods

General advantages of spatial domain LSB technique are:

1. There is less chance for degradation of the original image.


2. More information can be stored in an image.

Disadvantages of LSB technique are:

1. Less robust, the hidden data can be lost with image manipulation.
2. Hidden data can be easily destroyed by simple attacks.

1.4.2. Transform Domain Technique:This is a more complex way of hiding information in animage. Various
algorithms and transformations are used on the image to hide information in it. Transform domain embedding can be
termed as a domain of embedding techniques for which a number of algorithms have been suggested [17]. The process
of embedding data in the frequency domain of a signal is much stronger than embedding principles that operate in the
time domain. Most of the strong steganographic systems today operate within the transform domain Transform domain
techniques have an advantage over spatial domain techniques as they hide information in areas of the image that are
less exposed to compression, cropping, and image processing. Some transform domain techniques do not seem
dependent on the image format and they may outrun lossless and lossy format conversions. Transform domain
techniques are broadly classified into:

1. Discrete Fourier transformation technique (DFT).


2. Discrete cosine transformation technique (DCT).
3. Discrete Wavelet transformation technique (DWT).
4. Lossless or reversible method (DCT)
5. Embedding in coefficient bits

1.4.3 Distortion Techniques: Distortion techniques need knowledge of the original coverimage during the decoding
process where the decoder functions to check for differences between the original cover image and the distorted cover
image in order to restore the secret message. The encoder adds a sequence of changes to the cover image. So,
information is described as being stored by signal distortion [18].Using this technique, a stego object is created by
applying a sequence of modifications to the cover image. This sequence of modifications is use to match the secret
message required to transmit [19].The message is encoded at pseudo-randomly chosen pixels. If the stego-image is
different from the cover image at the given message pixel, the message bit is a “1.” otherwise, the message bit is a “0.”
The encoder can modify the “1” value pixels in such a manner that the statistical properties of the image are not
affected. However, the need for sending the cover image limits the benefits of this technique. In any steganographic
technique, the cover image should never be used more than once. If an attacker tampers with the stego-image by
cropping, scaling or rotating, the receiver can easily detect it. In some cases, if the message is encoded with error
correcting information, the change can even be reversed and the original message can be recovered [20].

1.4.4 Masking and Filtering: These techniques hide information by marking an image, in thesame way as to paper
watermarks. These techniques embed the information in the more significant areas than just hiding it into the noise
level. The hidden message is more integral to the cover image. Watermarking techniques can be applied without the
fear of image destruction due to lossy compression as they are more integrated into the image.

Advantages of Masking and filtering Techniques:


1. This method is much more robust than LSB replacement with respect to compression since the information

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 724


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

is hidden in the visible parts of the image.

Disadvantages of Masking and filtering Techniques:


1. Techniques can be applied only to gray scale images and restricted to 24 bits.

II. LITERATURE REVIEW

In [1] authors have proposed an adaptive least significant bit spatial domain embedding method. This method divides
the image pixels ranges (0-255) and generates a stego-key. This private stego-key has 5 different gray level ranges of
image and each range indicates to substitute fixed number of bits to embed in least significant bits of image. The
strength of proposed method is its integrity of secret hidden information in stego-image and high hidden capacity. The
limitation is to hide extra bits of signature with hidden message for its integrity purpose. It also proposed a method for
color image just to modify the blue channel with this scheme for information hiding. This method is targeted to achieve
high hidden capacity plus security of hidden message.

Yang et al., in [2] proposed an adaptive LSB substitution based data hiding method for image. To achieve better visual
quality of stego-image it takes care of noise sensitive area for embedding. Proposed method differentiates and takes
advantage of normal texture and edges area for embedding. This method analyzes the edges, brightness and texture
masking of the cover image to calculate the number of k-bit LSB for secret data embedding. The value of k is high at
non-sensitive image region and over sensitive image area k value remain small to balance overall visual quality of
image. The LSB’s (k) for embedding is computed by the high-order bits of the image. It also utilizes the pixel
adjustment method for better stego-image visual quality through LSB substitution method. The overall result shows a
good high hidden capacity, but dataset for experimental results are limited; there is not a single image which has many
edges with noise region like ‘Baboon.tif’.

In [3] anthers have proposed LSB based image hiding method. Common pattern bits (stego-key) are used to hide data.
The LSB’s of the pixel are modified depending on the (stego-key) pattern bits and the secret message bits. Pattern bits
are combination of MxN size rows and columns (of a block) and with random key value. In embedding procedure, each
pattern bit is matched with message bit, if satisfied it modifies the 2nd LSB bits of cover image otherwise remains the
same. This technique targets to achieve security of hidden message in stego-image using a common pattern key. This
proposed method has low hidden capacity because single secret bit requires a block of (MxN) pixels.

In [4] author proposed a Pixel value difference (PVD) and simple least significant bits scheme are used to achieve
adaptive least significant bits data embedding. In pixel value differencing (PVD) where the size of the hidden data bits
can be estimated by difference between the two consecutive pixels in cover image using simple relationship between
two pixels. PVD method generally provides a good imperceptibility by calculating the difference of two consecutive
pixels which determine the depth of the embedded bits. Proposed method hides large and adaptive k-LSB substitution
at edge area of image and PVD for smooth region of image. So in this way the technique provide both larger capacity
and high visual quality according to experimental results. This method is complex due to adaptive k generation for
substitution of LSB.

In [5] authors proposed a method of Multi-Pixel Differencing (MPD) which used more than two pixel to estimate
smoothness of each pixel for data embedding and it calculate sum of difference value of four pixels block. For small
difference value it uses the LSB otherwise for high difference value it uses MPD method for data embedding. Strength
is its simplicity of algorithm but experimental dataset is too limited.

In [6] author proposed another pixel value differencing method, it used the three pixels for data embedding near the
target pixel. It uses simple k-bit LSB method for secret data embedding where number of k -bit is estimated by near
three pixels with high difference value. To retain better visual quality and high capacity it simply uses optimal pixel
adjustment method on target pixels. Advantage of method is histogram of stego-image and cover-image is almost same,
but dataset for experiments are too small.

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 725


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

In [7] authors have introduced a high capacity of hidden data utilizing the LSB and hybrid edge detection scheme. For
edge computation two types of canny and fuzzy edges detection method applied and simple LSB substitution is used to
embed the hidden data. This scheme is successful to embed data with higher peak signal to noise ratio (PSNR) with
normal LSB based embedding. The proposed scheme is tested on limited images dataset. This method is not tested on
extensive edges based image like ‘Baboob.tif’

Madhuet al., in [8] proposed an image steganography method, based on LSB substitution and selection of random pixel
of required image area. This method is target to improve the security where password is added by LSB of pixels. It
generates the random numbers and selects the region of interest where secret message has to be hidden. The strength of
method is its security of hidden message in stego-image, but has not considers any type of perceptual transparency.

In [9] proposed an image steganographic method of mapping pixels to alphabetic letters. It maps the 32 letters (26 for
English alphabetic and other for special characters) with the pixel values. Five (5) bits are required to represent these 32
letters and authors have generated a table where 4 cases design to represent these 32 letters. According to that table,
each letter can be represented in all 4 cases. It utilizes the image 7 MSB (Most Significant Bits) (27 = 128) bits for
mapping. Proposed method maps each 4-case from the 7 MSB’s of pixel to one of the 32 -cases in that table. These 4-
cases increase the probability of matching. This algorithm keeps the matching pattern of cover-image which is then
used for extracting data from the stego-image. Proposed method does not required any edge or smoothness
computations but secret data should be in the form of text or letter for embedding.

In [10], authors have introduced a data hiding technique where it finds out the dark area of the image to hide the data
using LSB. It converts it to binary image and labels each object using 8 pixel connectivity schemes for hiding data bits.
This method required high computation to find dark region its connectivity and has not tested on high texture type of
image. Its hiding capacity totally depends on texture of image.

Babitaet al., in [11] uses 4 LSB of each RGB channel to embed data bits, apply median filtering to enhance the quality
of the stego image and then encode the difference of cover and stego image as key data. In decoding phase the stego-
image is added with key data to extract the hidden data. It increases the complexity to applying filtering and also has to
manage stego-key. Proposed scheme has high secret data hiding capacity.

In [12] author have proposed a pixel indicator technique with variable bits; it chooses one channel among red, green
and blue channels and embeds data into variable LSB of chosen channel. Intensity of the pixel decides the variable bits
to embed into cover image. The channel selection criteria are sequential and the capacity depends on the cover image
channel bits. Proposed method has almost same histogram of cover and stego-image.

Hamid et al., in [13] have proposed a texture based image steganography. The texture analysis technique divides the
texture areas into two groups, simple texture area and complex texture area. Simple texture is used to hide the 3-3-2
LSB (3 bits for Red, 3 bits for Green, 2 bits for Blue channels) method. On the other hand over complex texture area 4
LSB embedding technique is applied for information hiding. The above method used the both (2 to 4 LSB for each
channel) methods depending on texture classification for better visual quality. Proposed method has high hidden
capacity with considering the perceptual transparency measures e.g PSNR etc.

M. Chaumont et al., in [14] have proposed a DCT based data hiding method. It hides the color information in a
compress gray-level image. It follows the color quantization, color ordering and the data hiding steps to achieve image
steganography. The purpose of method is to give free access to gray-level image to everyone but restricted access of
same color images to those who have its stego-key. It has high PSNR plus with noticeable artifact of embedding data.

K. S. Babuet al., in [15] proposed hiding secret information in image steganography for authentication which is used to
verify the integrity of the secret message from the stego-image. The original hidden message is first transformed from
spatial domain to discrete wavelet transform (DWT); the coefficients of DWT are then permuted with the verification
code and then embedded in the special domain of the cover image. The verification code isalso computed by special

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 726


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

coefficient of the DWT. So this method can verify each row of the image of modified or tampered by any attacker.

In [16] a novel lossless or reversible data hiding scheme for binary images is proposed. JPEG2000 compressed data is
used and the bit-depth of the quantized coefficients are also embedded into some code-blocks. Proposed data
embedding method is useful for binary images not for gray or color images.

In [18] the secure data transmission over internet is achieved using Steganography. In this paper High Capacity and
Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the
cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and
payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is
observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the
existing algorithms.
In [21] Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various
steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such
technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to
steganalysis so as to make it more secure we encrypt the raw data before embedding it in the image. Though the
encryption process increases the time complexity, but at the same time provides higher security also. This paper uses
two popular techniques Rivest, Shamir, Adleman (RSA) algorithm and Diffie Hellman algorithm to encrypt the data.
The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman
algorithm is used in stead of RSA algorithm.

III. CRITICAL ANALYSIS

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 727


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 728


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

IV. CONCLUSION AND FUTURE WORK

This paper gave an overview of different steganographic techniques its major types and classification of steganography
which have been proposed in the literature during last few years. We have critical analyzed different proposed
techniques which show that visual quality of the image is degraded when hidden data increased up to certain limit using
LSB based methods. And many of them embedding techniques can be broken or shows indication of alteration of
image by careful analysis of the statistical properties of noise or perceptually analysis.

REFERENCES

[1] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on
Private Stego-Keys”, International Journal of Computer Science and Security (IJCSS), vol. 4, (2010) March 1.
[2] H. Yang, X. Sun and G. Sun, “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”, Journal: Radioengineering,
vol. 18, no. 4, (2009), pp. 509-516.
[3] S. Channalli and A. Jadhav, “Steganography an Art of Hiding Data”, International Journal on Computer Science and Engineering, IJCSE, vol.
1, no. 3, (2009).
[4] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Member, IEEE and H.-M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB
Domain Systems”, IEEE Transactions on Information Forensics and Security, vol. 3, no. (2008) September 3, pp. 488-497.
[5] K.-H. Jung, K.-J. Ha and K.-Y. Yoo, “Image data hiding method based on multi-pixel differencing and LSB substitution methods”, Proc. 2008
International Conference on Convergence and Hybrid Information Technology (ICHIT '08), Daejeon (Korea), (2008) August 28-30, pp. 355-358.
[6] H. Zhang, G. Geng and C. Xiong, “Image Steganography Using Pixel-Value Differencing”, Electronic Commerce and Security, ISECS '09.
Second International Symposium on (2009) May.
[7] W. J. Chen, C. C. Chang and T. H. N. Le, “High Payload Steganography Mechanism Using Hybrid Edge Detector”, Expert Systems with
Applications (ESWA 2010), vol. 37, pp. 3292-3301, (2010) April 4.
[8] V. MadhuViswanatham and J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer
Science and Engineering, IJCSE, vol. 2, (2010).
[9] M. A. Al-Husainy, “Image Steganography by Mapping Pixels to Letters”, Journal of Computer Science, vol. 5, no. 1, (2009), pp. 33-38.
[10] H. Motameni, M. Norouzi, M. Jahandar and A. Hatami, “Labeling Method in Steganography”, World Academy of Science, Engineering and
Technology, France, (2007).

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 729


ISSN(Online): 2320-9801
ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer


and Communication Engineering
( A H igh I m pa ct Fa ct or , M on t h ly, Pe e r Re vie w e d Jou rn a l)

Vol. 4 , I ssue 1 , Ja nua ry 2 0 1 6

[11] B. Ahuja, M. Kaur and M. Rachna, “High Capacity Filter Based Steganography”, International Journal of Recent Trends in Engineering, vol. 1,
no. 1, (2009) May.
[12] M. TanvirParvez and A. Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, IEEE Asia-Pacific Services
Computing Conference, (2008), pp. 1322-1327.
[13] A. M. Hamid and M. L. M. Kiah, “Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis”,
International Journal of Engineering and Technology (IJET): 0975-4042,
(2009).
[14] M. Chaumont and W. Puech, “DCT-Based Data Hiding Method To Embed the Color Information in a JPEG Grey Level Image”, 14th European
Signal Processing Conference (EUSIPCO 2006), Florence, Italy, copyright by EURASIP, (2006) September 4-8.
[15] K. S. Babu, K. B. Raja, K. Kiran Kumar, T. H. Manjula Devi, K. R. Venugopal and L. M. Pataki, “Authentication of secret information in
image steganography”, IEEE Region 10 Conference, TENCON-2008, (2008) November, pp. 1-6.
[16] S. Ohyama, M. Niimi, K. Yamawaki and H. Noda, “Lossless data hiding using bit depth embedding for JPEG2000 compressed bit-stream”,
Journal of Communication and Computer, vol. 6, no. 2, (2009) February.
[17] N. F. Johnson and S. Katzenbeisser, “A Survey of steganographic techniques. in Information Hiding Techniques for Steganography and Digital
Watermarking,S.Katzenbeisser and F.Petitcolas, Ed. London: Artech House, (2000), pp. 43-78.
[18] H. S. Majunatha Reddy and K. B. Raja, (2009) High capacity and security steganography using discrete wavelet transform. International
Journal of Computer Science and Security. pp. 462-472.
[19] S. C. Katzenbeisser. Principles of Steganography. in Information Hiding Techniques for Steganography and Digital Watermarking”, S.
Katzenbeisser and F. Petitcolas, Ed. London: Artech House, (2000), pp. 43-78
[20] P. Kruus, C. Scace, M. Heyman, and M. Mundy., A survey of steganography techniques for image files . Advanced Security Research Journal.
[On line], 5(1), (2003), pp. 41-52.
[21] N. Johnson and S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer, pp. 26-34, February (1998).
[22] Pfitzmann, B., Information hiding terminology - results of an informal plenary meeting and additional proposals. In: Proceedings of the First
International Workshop on Information Hiding. Springer-Verlag, London, UK, pp. 347–350. (1996).
[23] E Lin, E Delp, A Review of Data Hiding in Digital Images. Proceedings of the Image Processing, Image Quality, Image Capture Systems
Conference (PICS'99), Savannah, Georgia, April 25-28, (1999).
[24] Handel, T. &Sandford, M., Hiding data in the OSI network model, Proceedings of the 1st International Workshop on Information Hiding, June
(1996).

Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 730

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy