Open Access Open Access  Restricted Access Subscription or Fee Access

Review – An approach to steganography technique

Himanshu Monga, Neha Garg

Abstract


Steganography is the technique that provides the base for secure communication. It is the art of hiding information in some other means of false medium for making a possible secure communication. The information to be hidden can be of any form such as text, image and video etc. and so the cover medium. Unlike cryptography, in steganography after the data is successfully hidden it is not even visible to the eavesdropper or the intruder which makes this technique safer and secure to follow. This review includes all about the major steganography techniques in spatial and transformational domain keeping the main focus on image steganography.

Full Text:

PDF

References


M. Radhika Mani, V. Lalithya, and P.Swetha Rekha. “An innovative approach for pattern based image steganography”, IEEE, presented at the Int. conf. signal processing, informatics, communication and energy systems, pp. 1-4, Feb. 2015.

Nadeem Akhtar, Shahbaaz Khan, and Pragati Johri, “An improved inverted LSB image steganography”, IEEE, Int. Conf. on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 749-755, Feb. 2014.

P Sandeep Reddy and Kalpana Reddy, “Hiding image in video”, International Journal of Research Sciences and Advanced Engineering (IJRSAE) TM Volume 2, Issue 8, pp. 87 - 91, Oct - Dec 2014.

K B Shiva Kumar, K B Raja, R K Chhotaray, and Sabyasachi Pattanaik, “Bit length replacement steganography based on DCT coefficients”, ResearchGate, International Journal of Engineering Science and Technology, ISSN: 0975-5462, Vol. 2(8), pp. 3561-3570, 2010.

Barnali Gupta Banik and Samir Kumar Bandyopadhyay, “Implementation of image steganography algorithm using scrambled image and quantization coefficient modification in DCT”, IEEE Int. conf. on Research in Computational intelligence and Communication networks (ICRCICN) ,pp. 400-405, Nov. 2015.

Neda Raftari and Amir Masoud Eftekhari Moghadam, “Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT”, IEEE Fourth Int. conf. on Computational Intelligence, Communication Systems and Networks, pp. 295-300, July. 2012.

Prajanto Wahyu Adi, Farah Zakiyah Rahmanti and Nur Azman Abu, “High Quality Image Steganography on Integer Haar Wavelet Transform using Modulus Function”, IEEE Int. conf. on Science in Information Technology (ICSITech), pp. 79-84, Oct. 2015

Mohammad Reza Dastjani Farahani and Ali Pourmohammad, “A DWT Based Perfect Secure and High Capacity Image Steganography Method”, IEEE Int. conf. on Parallel and Distributed Computing, Applications and Technologies, pp. 314-317, Dec. 2013.

Sudhir Keshari and Shri Gopal Modani, “Weighted Fractional Fourier Transform based Image Steganography”, IEEE Int. conf. on Recent Trends in Information Systems, pp. 214-217, Dec. 2011.

Heba Mostafa, Ahmed Fouad Ali, and Ghada EI Taweal, “Hybrid curvelet transform and least significant bit for image steganography”, IEEE Seventh Int. Conf. on Intelligent Computing and Information Systems (ICICIS'15), pp. 300-305, Dec. 2015.




DOI: https://doi.org/10.37628/jdcas.v2i2.312

Refbacks

  • There are currently no refbacks.