A Overview of various Steganographic Domains and its applications

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-52 Number-3
Year of Publication : 2017
Authors : Poonam Yadav, Maitreyee Dutta
DOI :  10.14445/22315381/IJETT-V52P221

Citation 

Poonam Yadav, Maitreyee Dutta "A Overview of various Steganographic Domains and its applications", International Journal of Engineering Trends and Technology (IJETT), V52(3),137-141 October 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Due to increase in usage of internet, it has become important to keep the online communication secure and concealed. Many users are there all over the world who shares their views, thoughts and ideas through the use of international network. Many techniques have been developed so far for ensuring the secrecy of transfer of these thoughts and ideas. Few of them are stegnalysis, cryptanalysis and copyright protection more often known as digital watermarking. Sometimes the combination or hybrid of these techniques is used to attain confidential data such as in military, banks etc. One such technology named as crystography which is a hybrid of steganography and cryptography. This paper aims at discussing various steganography algorithms developed till now and their applications in real life that might help researchers in this field by giving guidelines for future scope and work.

Reference
[1] Sumeet Kaur, Savina Bansal, R. K. Bansal, “Steganography and classification of image steganography techniques”, International Conference on Computing for Sustainable Global Development, pp. 870-875, 2014.
[2] T. Moerland, “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf, pp. 1-8, 2001.
[3] Katzenbeisser, S., Petitcolas F. A.: “Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, London, 2000, pp. 64.
[4] R. J. Anderson & Petitcolas, “On the limits of steganography”, IEEE Journal of selected Areas in Communications, Vol. 16, pp. 474-481, 1998.
[5] Y. K. Lee & L. H. Chen, “High Capacity Image Steganographic Model”, IEE Proceedings- Vision, Image and Signal Processing, Vol. 147, pp. 288-294, 2000.
[6] L.M. Marvel, C.G. Boncelet, & C. Retter, “Spread Spectrum Steganography”, IEEE Transactions on image processing, Vol. 8, pp. 1075-1083, 1999.
[7] T. Morkel, J.H.P. Eloff & M.S. Olivier, “An Overview of Image Steganography”, Proceedings of Information and Computer Security Architecture (ICSA) Research Group, Pretoria, South Africa, pp. 1-12, 2005.
[8] Shivani Chauhan and Jyotsna, “Multiple Layer Text Security using Variable Block Size Cryptography and Image Steganography”, International Conference on Computational Intelligence and Communication Technology, IEEE, pp. 1-7, 2017.
[9] Brad H. Astrowsky, “Steganography: Hidden Images, A New Challenge in the Fight against Child Porn” URL http://www.antichildporn.org/steganog.html.
[10] James C. Judge, “Steganography: Past, Present, Future”, Information Security Reading Room, SANS, 2001.
[11] Sahar A. El_Rehman, “A Comparative Analysis of Image Steganography based on DCT Algorithm and Steganography Tool to Hide Nuclear Reactors Confidential Information”, Journal of Computers and Electrical Engineering, Elsevier, pp. 1-20, 2016.
[12] Mansi S. Subhedar and Vijay H. Mankar, “ Image Steganography using Redundant Discrete Wavelet Transform and QR Factorization ”, Journal of Computer and Electrical Engineering, Elsevier, Vol. 54, pp. 406-422, 2016.
[13] Yash Kumar Singh and Sudhanshu sharma, “Image Steganography on gray and color image using DCT Enhancement and RSA with LSB method”, International Conference on Inventive Computation Technologies, IEEE, Vol. 3, pp. 1-5, 2016.
[14] A. K. Gulve and M. S. Joshi, “ An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach”, Journal of Mathematical Problems in Engineering, Hindawi Publishing Corporation, Vol. 2015, pp. 1-11, 2015.
[15] Fangjun Huang, Jiwu Huang and Yun-Quing Shin, “New Framework for Reversible Data Hiding in Encrypted Domain”, IEEE Transactions on Information Forensics and Security, Vol. 11, pp. 2777-2789, 2016.
[16] A. K. Gulve and M. S. Joshi, “An image steganography algorithm with five pair differencing and gray code conversion”, International Journal Image, Graphics and Signal Processing, Vol. 6, no. 3, pp. 12-20, 2014.

Keywords
Steganography, transform domain, space domain, cover media, stego media, concealed information.