CFP last date
20 December 2024
Reseach Article

Analytic Survey on Various Techniques of Image Steganography

by Gajendra Singh Rajput, Shilky Shrivastava, Anand Singh Bisen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 1
Year of Publication: 2015
Authors: Gajendra Singh Rajput, Shilky Shrivastava, Anand Singh Bisen
10.5120/ijca2015907271

Gajendra Singh Rajput, Shilky Shrivastava, Anand Singh Bisen . Analytic Survey on Various Techniques of Image Steganography. International Journal of Computer Applications. 132, 1 ( December 2015), 42-45. DOI=10.5120/ijca2015907271

@article{ 10.5120/ijca2015907271,
author = { Gajendra Singh Rajput, Shilky Shrivastava, Anand Singh Bisen },
title = { Analytic Survey on Various Techniques of Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 1 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number1/23562-2015907271/ },
doi = { 10.5120/ijca2015907271 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:28:01.590400+05:30
%A Gajendra Singh Rajput
%A Shilky Shrivastava
%A Anand Singh Bisen
%T Analytic Survey on Various Techniques of Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 1
%P 42-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we have analytic survey on various techniques of image steganography, these technique are paying their role more efficiently to establish secure communication in more effective way, these idea work on various pattern, text and images also and help to hide confidential matter or information sharing in a newly created steganography techniques. Some latest invented steganography ideas on image with their advantages and disadvantages are disclosing though this analytic survey. It is basically a growing technique of confidentiality in various aspects of safe and confidential communication.

References
  1. Della Babya, Jitha Thomasa, Gisny Augustinea, Elsa Georgea, Neenu Rosia Michaela, “A Novel DWT based Image Securing Method using Steganography,” International Conference on Information and Communication Technologies (ICICT 2014), Procedia Computer Science 46 ( 2015 ) 612 – 618
  2. Ratnakirti Roy and Suvamoy Changder, “Object Based Image Steganography with Pixel Polygon Tracing”, Springer India 2015.
  3. S.G.Shelke, S.K.Jagtap, “Analysis of special domain Image steganography technique, 2015 International Conference on Computing Communication Control and Automation, 2015 978-1-4799-6892-3/15 $31.00 © 2015 IEEE.
  4. Blossom Kaur, AmandeepKaur, Jasdeep Singh, Steganographic Approach for Hiding Image in DCT Domain, International Journal of Advances in Engineering & Technology, July 2011.
  5. Po-Yueh Chen, Hung-Ju Lin, A DWT Based Approach for Image Steganography, International Journal of Applied Science and Engineering 4, 3: 275-290. 2006
  6. R. Singh, G. Chawla, “A Review on Image Steganography,”Internationl Journal of Advanced Research inComputer Science and Software Engineering , vol. 4, pp. 686-689, May. 2014.
  7. Rakhi, S. Gawande, “A Review on Steganography Methods,” Internationl Journal of Advanced Research in Electrical ,Electronics and Instrumentation Engineering , vol. 2, no. 6, pp. 4635-4638, Oct. 2013.
  8. C. Gayathri, V. Kalpana, “A Study on Image Steganography Techniques,” Internationl Journal of Engineering and Technology(IJET) , vol. 5, no. 2, pp. 572-577, Apr-May. 2013.
  9. Jitendra Singh Sengar, Enhanced Artificial Neural Network Approach to indentify specific binary pattern International Journal of Hybrid Information Technology Vol.8, No.6 (2015), pp.391-396
  10. W. Hong and T.S. Chen, "A Novel Data Embedding Method Using Adaptive Pixel Pair Matching," IEEE Transactions on InformationForensics and Security, vol. 7, Feb. 2012
  11. Yadav, Rajkumar, Rishi, Rahul, Batra, Sudhir, “A new Steganography Method for Gray Level Images using Parity Checker,” International Journal of Computer Applications, vol. 11, no. 11, Dec. 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Image stagnography PSNR SSIM OBIS DCT DWT