We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Article:Steganography- A Data Hiding Technique

by Arvind Kumar, Km. Pooja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 7
Year of Publication: 2010
Authors: Arvind Kumar, Km. Pooja
10.5120/1398-1887

Arvind Kumar, Km. Pooja . Article:Steganography- A Data Hiding Technique. International Journal of Computer Applications. 9, 7 ( November 2010), 19-23. DOI=10.5120/1398-1887

@article{ 10.5120/1398-1887,
author = { Arvind Kumar, Km. Pooja },
title = { Article:Steganography- A Data Hiding Technique },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 9 },
number = { 7 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume9/number7/1398-1887/ },
doi = { 10.5120/1398-1887 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:00.742066+05:30
%A Arvind Kumar
%A Km. Pooja
%T Article:Steganography- A Data Hiding Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 9
%N 7
%P 19-23
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval.

References
  1. K., and Kundur D., “Practical Internet Steganography: Data Hiding in IP” found online at http://www.ece.tamu.edu/~deepa/pdf/txsecwrksh03.pdf
  2. Anderson R.J. and Petitcolas F.A.P., “On the Limits of steganography,” J. Selected Areas in Comm., vol. 16, no.4, 1998, pp. 474–481.
  3. Bailey, K. and Curran, K. “An evaluation of image-based steganography methods”. International Journal of Digital Evidence, Fall 2003.
  4. Chapman, M. Davida G, and Rennhard M.. “A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography” found online at http://www.nicetext.com/doc/isc01.pdf
  5. Dai Y., Liu G., and WangBreaking Z., “Predictive-Coding- Based Steganography and Modification for Enhanced Security”, IJCSNS International Journal of Computer Science and Network Security, vol.6 no. 3b, March 2006.
  6. Chin-Chen Chang , Iuan-Chang Lin, and Yaun-Hui YU, “ A new Steganographic method for color and gray scale image hiding”, Computer Vision and Image Understanding, 20 December 2006.
  7. Shareza Shirali, M.H, “Anew Approach to persain/Arabic Text Stegraphy”, Computer and Information Science, 2006, ICIS-COMSAR 2006, 5th IEEE/ACIS International Conference, 10-12 July 2006 pp 310-315.
  8. Fabien A.P., and Petitcolas, “Information Hiding: Techniques for Steganography and Digital Watermarking.”, 2000.
  9. National Academy of Sciences, How do Wavelets work? National Academy of Sciences, http://www.beyonddiscovery.org/content/view.page.asp?I=1956, 2003 .
  10. Digital Watermarking for Digital Media, Information Science Publishing.
  11. Hiding in Plain Sight: Steganography and the Art of Covert Communication Cole, Eric.
  12. Information Hiding: Steganography and Watermarking Attacks and Countermeasures (Advances in Information Security, Volume 1) Johnson, Neil F. / Doric, Zoran / Jajodia.
  13. Computerworld. Steganography: Hidden Data. Quick study by Deborah Radcliff. [Online] 2002. http://www.computerworld.com/securitytopics/security/story/0,10801,71726,00. html.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Steganalysis Digital watermarking Stego key Stego image and Cryptography