A Case study on Steganography and its Attacks
Citation
Yashika Garg, Amneet Kaur "A Case study on Steganography and its Attacks", International Journal of Engineering Trends and Technology (IJETT), V47(8),453-457 May 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Steganographic systems work in many different ways to embed the secret data into the cover media. Digital steganographic techniques are limited in their ability to adequately adapt and respond to the increasing body of the steganographic techniques. Most of the modern steganographic attacks are highly destructive to the cover media. In order to properly combat the steganography , an attack methodology that is effective and adaptable is required. This paper includes the detail study of Steganography introduction, concept and its applications. Categories of steganography that tell which Steganography techniques should be used.
References
[1] Dr. Fadhil Salman Abed ?A Proposed Method of Information Hiding Based on Hybrid Cryptography and Steganography, IJAIEM, Volume 2, Issue 4, April 2013
[2] R. Balaji, G. Naveen, ?Secure Data Transmission Using Video Steganography?, International Journal of Computational Engineering Research (ijceronline.com) VOLUME 2. July-August 2012.
[3] W. Bender,D. Gruhl,N. Morimoto,A. Lu,?Techniques for data Hiding, IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4, 1996.
[4] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi, ?A Survey on Image Steganography and Steganalysis,Journal of Information Hiding and Multimedia Signal Processing c 2011 ISSN 2073-4212 Ubiquitous International Volume 2, Number 2, April 2011.
[5] Pratap Chandra Mandal, ?Modern Steganographic technique: A Survey, International Journal of Computer Science & Engineering Technology (IJCSET).
[6] Arvind Kumar, Km. Pooja, ?Steganography- A Data Hiding Technique, International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010.
[7] Salomon,D. , ?Data Hiding in Text, - Springer,2003
[8] Harish Kumar, Anuradha, ?Enhanced LSB technique for Audio Steganography, IEEE-20180.
[9] Neil F. Jonhson and Stefan C. Katzenbeisser, ?A survey of steganographic techniques, Artech house.
[10] Rangarajan A. Vasudevan, Sugata Sanyal, Ajith Abraham, Dharma P. Agrawal, ?Jigsaw-based secure data transfer over computer networks, Proceedings of International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, Vol. 1, 5-7 April 2004, pp. 2- 6.
[11] Harshavardhan Kayarkar, Sugata Sanyal, ?A Survey on Various Data Hiding Techniques and their Comparative Analysis, ACTA Technica Corviniensis, Vol. 5, Issue 3, July-September 2012, pp. 35-40
[12] Gwenaël Doërr and Jean-Luc Dugelay, ?Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking?, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 52, NO. 10, OCTOBER 2004.
[13] W. Bender,D. Gruhl,N. Morimoto,A. Lu,?Techniques for data Hiding, IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4, 1996.
[14] Rani, Neha, and Jyoti Chaudhary. "Text steganography techniques: A review." International Journal of Engineering Trends and Technology (IJETT) 4, no. 7 (2013): 3013-3015.
[15] Kaur, Navneet, and Sunny Behal. "A Survey on various types of Steganography and Analysis of Hiding Techniques." International Journal of Engineering Trends and Technology 11, no. 8 (2014): 387-91.
Keywords
Steganography, Digital steganography, Steganographic attacks, Cover media, Encode.