Details



AN OVERVIEW OF DIFFERENT TYPE OF DATA HIDING SCHEME IN IMAGE USING STEGANOGRAPHIC TECHNIQUES

Anuj

32-41

Vol. 2, Jul-Dec, 2015

Date of Submission: 2015-06-30 Date of Acceptance: 2015-08-02 Date of Publication: 2015-08-28

Abstract

Steganography is hiding the secret data into a cover object to protect it from unauthorized access. It is a technique of invisible communication which hides the existence of the message. If the cover object used is an image, the steganography is known as image steganography. It has many applications like Online transactions, military communication etc. In this paper we are discussing Existing important image steganography techniques like Least Significant Bit (LSB), Pixel Value Differencing (PVD), and Modified Kekre Algorithm (MKA) etc.

References

  1. Chandramouli R. and Memon N. (2001), 'Analysis of LSB based Image Steganography Techniques', Proceedings of ICIP 2001, Thessaloniki, Greece, October 7−10.
  2. Deshpande N, Snehal K., ”Implementation of LSB Steganography and Its Evaluation for Various Bits” K.K.Wagh Institute of Engineering Education & Research, Nashik India
  3. http://www.appliedtrust.com/resources/security/every-company-needs-tohave-asecurity -program
  4. Johnson, N.F. & Jajodia, S. (1998), “Exploring Steganography: Seeing the Unseen”, Computer Journal
  5. Kekre H.B, Athawale A,Halarnkar P.N(2009), “Performance Evaluation of Pixel Value Differencing and Kekre‟s Modified Algorithm for Information Hiding in Images”, International Conference on Advances in Computing, Communication and Control, pp 342-346
  6. M. Hussain, M. Hussain., (2010) “Pixel Intensity Based High Capacity Data Embedding Method”, Information and Emerging Technologies, International conference 978-1-4244-8003
  7. Morkel, T., Eloff, J.H.P & Olivier, M.S., (2005) 'An overview of Image Steganography', Proceedings of Information Security South Africa (ISSA) Conference
  8. Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
  9. N. Tiwari and M. Shandilya, (2010) “Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth”, International Journal of Security and Its Applications Vol. 4(4)
  10. Swain G, Lenka S.K (2011),”Steganography Using the Twelve Square Substitution Cipher and an Index Variable”.
  11. Swain G, Lenka S.K (2010), “A Hybrid Approach to Steganography Embedding at Darkest and Brightest Pixels”, International Conference on Communication and Computational Intelligence
  12. Wu D. C and Tsai W. H. (2003), “A steganographic method for images by pixelvalue differencing', Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626.
  13. Wu H.C., et al. (2005), “Image Steganographic scheme based on pixel-value differencing and LSB replacement methods”, VISP(152)
  14. Babloo Saha, Shuchi Sharma (2012), “Steganographic Techniques of Data Hiding Using Digital Image”, vol. 62, pp. 11-18
Download PDF
Back