Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Steganography Techniques: A Survey

Author : Dipak U. Chaudhari 1 Dr. Sahebrao B. Bagal 2

Date of Publication :22nd February 2018

Abstract: Steganography means the study of invisible communication. In Steganography usually, hide the existence of the communicated data in such a way that it remains confidential & it maintains secrecy between two communicating parties. Data hiding techniques have the crucial role in the rapid growth of secret communications & intensive transfer of multimedia content. The art of hiding information in ways that prevent detection is used in Steganography. Secrecy is achieved by embedding data into cover image and generating a stego-image, in image Steganography. Different types of steganography techniques are present & each has their strengths and weaknesses. In this paper, we review the different data hiding & security techniques that are used to implement a steganography

Reference :

    1. Johnson, N.F and Jajodia, S., “Exploring Steganography:Seeing the Unseen”, Computer Journal, February 2008.
    2. Blossom kaur1, Amandeep kaur2 and Jasdeep singh,”Steganographic approach for hiding image in dct domain” International Journal of Advances in Engineering & Technology, July 2011.
    3. R.Amirtharajan and R.Akila,” A Comparative Analysisof Image Steganography;” International Journal of ComputerApplications (0975 – 8887) ,Volume 2 – No.3, May 2010.
    4. V. Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz, “Modulo based Image Steganography Technique against Statistical and Histogram Analysis”, IJCA Special Issue on“Network Security and Cryptography” NSC, 2011.
    5. Dumitrescu, S., W. Xiaolin and Z. Wang, 2003. Detection of LSB steganography via sample pair analysis. In: LNCS, Vol. 2578, Springer-Verlag, New York, pp: 355 -372.
    6. T. Sharp, “An implementation of key-based digital signal Steganography”, in Proc. Information Hiding Workshop,Springer LNCS 2137, pp. 13–26, 2001.
    7. Jarno Mielikainen, "LSB Matching Revisited", Signal Processing Letters, IEEE, Publication Date: May 2006Volume : 13, Issue : 5, pp. 285- 287.
    8. K..M. Singh, L.S. Singh, A.B. Singh and K.S. Devi,“Hiding Secret Message in Edges of the Images”, Information and Communication Technology, 2007. ICICT „07, pp. 238-241
    9. Jagvinder Kaur and Sanjeev Kumar, ” Study and Analysis of Various Image Steganography Techniques” IJCST Vol.2, Issue 3, September 2011
    10. Lee, Y.K.; Chen, and L.H., “High capacity image Steganographic model”, Visual Image Signal Processing, 147:03,June 2008
    11. Ahn, L.V. and N.J. Hopper, 2004. Public-key steganography. In Lecture Notes in Computer Science.Vol. 3027 /2004 of Advances in Cryptology - EUROCRYPT 2004, pp: 323–341. Springer-Verlag Heidelberg.
    12. Yang, Chunfang., Liu, Fenlin., Luo, Xiangyang., and Zeng, Ying., “Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1, January 2013.
    13. Ishwarjot Singh ,J.P Raina,“ Advance Scheme for Secret Data Hiding System using Hop field & LSB” International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013.
    14. G. Manikandan, N. Sairam and M. Kamarasan “A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme “, Research Journal of Applied Sciences, Engineering and Technology 4(6): 608-614, 2012
    15. Shabir A. Parah, Javaid A. Sheikh, G.M. Bhat, “Data Hiding in Intermediate Significant Bit Planes, A High Capacity Blind Steganographic Technique”, International Conference on Emerging Trends in Science, Engineering and Technology , pp.192-197, July 2012.
    16. Michel K. Kulhandjian, Dimitris A. Pados, Ming Li, Stella N. Batalama, and Michael J. Medley, “Extracting spread-spectrum hidden data from digital media “, IEEE transactions on information forensics and security, vol. 8, no. 7, july 2013
    17. Chang, Chin-Chen., Lin, Iuan-Chang., and Yaun-Hui YU., “ A new Steganographic method for color and gray scale image hiding”, Computer Vision and Image Understanding, ELSEVIER, Vol. 107, No. 3, pp. 183- 194,2007.
    18. Bailey, K., and Curran, K., “An Evaluation of Image Based Steganography Methods”, Journal of Multimedia Tools and Applications, Vol. 30, No. 1, pp. 55-88, 2006.
    19. Adnan Gutub, Ayed Al-Qahtani, Abdulaziz Tabakh, “Triple-A: Secure RGB Image Steganography Based on Randomization”, International Conference on Computer Systems and Applications (AICCSA-2009), pp: 400-403, 10- 13 May 2009.
    20. Swati malik, Ajit “Securing Data by Using Cryptography with Steganography” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013.

Recent Article