A Overview of various Steganographic Domains and its applications
Citation
Poonam Yadav, Maitreyee Dutta "A Overview of various Steganographic Domains and its applications", International Journal of Engineering Trends and Technology (IJETT), V52(3),137-141 October 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Due to increase in usage of internet, it has
become important to keep the online communication
secure and concealed. Many users are there all over
the world who shares their views, thoughts and ideas
through the use of international network. Many
techniques have been developed so far for ensuring
the secrecy of transfer of these thoughts and ideas.
Few of them are stegnalysis, cryptanalysis and
copyright protection more often known as digital
watermarking. Sometimes the combination or hybrid
of these techniques is used to attain confidential data
such as in military, banks etc. One such technology
named as crystography which is a hybrid of
steganography and cryptography. This paper aims at
discussing various steganography algorithms
developed till now and their applications in real life
that might help researchers in this field by giving
guidelines for future scope and work.
Reference
[1] Sumeet Kaur, Savina Bansal, R. K. Bansal, “Steganography
and classification of image steganography techniques”,
International Conference on Computing for Sustainable
Global Development, pp. 870-875, 2014.
[2] T. Moerland, “Steganography and Steganalysis”, Leiden
Institute of Advanced Computing Science,
www.liacs.nl/home/ tmoerl/privtech.pdf, pp. 1-8, 2001.
[3] Katzenbeisser, S., Petitcolas F. A.: “Information Hiding
Techniques for Steganography and Digital Watermarking”,
Artech House, London, 2000, pp. 64.
[4] R. J. Anderson & Petitcolas, “On the limits of steganography”,
IEEE Journal of selected Areas in Communications, Vol. 16,
pp. 474-481, 1998.
[5] Y. K. Lee & L. H. Chen, “High Capacity Image
Steganographic Model”, IEE Proceedings- Vision, Image and
Signal Processing, Vol. 147, pp. 288-294, 2000.
[6] L.M. Marvel, C.G. Boncelet, & C. Retter, “Spread Spectrum
Steganography”, IEEE Transactions on image processing,
Vol. 8, pp. 1075-1083, 1999.
[7] T. Morkel, J.H.P. Eloff & M.S. Olivier, “An Overview of
Image Steganography”, Proceedings of Information and
Computer Security Architecture (ICSA) Research Group,
Pretoria, South Africa, pp. 1-12, 2005.
[8] Shivani Chauhan and Jyotsna, “Multiple Layer Text Security
using Variable Block Size Cryptography and Image
Steganography”, International Conference on Computational
Intelligence and Communication Technology, IEEE, pp. 1-7,
2017.
[9] Brad H. Astrowsky, “Steganography: Hidden Images, A New
Challenge in the Fight against Child Porn” URL
http://www.antichildporn.org/steganog.html.
[10] James C. Judge, “Steganography: Past, Present, Future”,
Information Security Reading Room, SANS, 2001.
[11] Sahar A. El_Rehman, “A Comparative Analysis of Image
Steganography based on DCT Algorithm and Steganography
Tool to Hide Nuclear Reactors Confidential Information”, Journal of Computers and Electrical Engineering, Elsevier,
pp. 1-20, 2016.
[12] Mansi S. Subhedar and Vijay H. Mankar, “ Image
Steganography using Redundant Discrete Wavelet Transform
and QR Factorization ”, Journal of Computer and Electrical
Engineering, Elsevier, Vol. 54, pp. 406-422, 2016.
[13] Yash Kumar Singh and Sudhanshu sharma, “Image
Steganography on gray and color image using DCT
Enhancement and RSA with LSB method”, International
Conference on Inventive Computation Technologies, IEEE,
Vol. 3, pp. 1-5, 2016.
[14] A. K. Gulve and M. S. Joshi, “ An Image Steganography
Method Hiding Secret Data into Coefficients of Integer
Wavelet Transform Using Pixel Value Differencing
Approach”, Journal of Mathematical Problems in
Engineering, Hindawi Publishing Corporation, Vol. 2015, pp.
1-11, 2015.
[15] Fangjun Huang, Jiwu Huang and Yun-Quing Shin, “New
Framework for Reversible Data Hiding in Encrypted
Domain”, IEEE Transactions on Information Forensics and
Security, Vol. 11, pp. 2777-2789, 2016.
[16] A. K. Gulve and M. S. Joshi, “An image steganography
algorithm with five pair differencing and gray code
conversion”, International Journal Image, Graphics and
Signal Processing, Vol. 6, no. 3, pp. 12-20, 2014.
Keywords
Steganography, transform domain, space
domain, cover media, stego media, concealed
information.