We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

The Act of Steganography from Ancient Era to Digital Age

Published on July 2015 by N.d. Jambhekar, C.a. Dhawale
National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
Foundation of Computer Science USA
NCKITE2015 - Number 2
July 2015
Authors: N.d. Jambhekar, C.a. Dhawale
fe337062-a612-4adc-a86d-948737c2e3b7

N.d. Jambhekar, C.a. Dhawale . The Act of Steganography from Ancient Era to Digital Age. National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015). NCKITE2015, 2 (July 2015), 1-4.

@article{
author = { N.d. Jambhekar, C.a. Dhawale },
title = { The Act of Steganography from Ancient Era to Digital Age },
journal = { National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) },
issue_date = { July 2015 },
volume = { NCKITE2015 },
number = { 2 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/nckite2015/number2/21483-2652/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%A N.d. Jambhekar
%A C.a. Dhawale
%T The Act of Steganography from Ancient Era to Digital Age
%J National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%@ 0975-8887
%V NCKITE2015
%N 2
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

Digital data in the form of text, images, audio and video are transmitted over the internet by means of communication links. The confidentiality of secret data should preserve from intruders. Steganography has a group of methods with which different algorithms are used to embed the secret data under the cover medium such as image, without any detectable indications on the cover image. This paper focuses on some image steganographic methods used from many years, the methods used currently and the capabilities of steganography in future.

References
  1. Reeds, J. 1998. Solved: The Ciphers in Book III of Trithemius's Steganographia. AT&T Labs Research. Florham Park. New Jersey 07932.
  2. Morkel, T. , Eloff, J. H. P. and Olivier M. S. 2005. An Overview of Image Steganography. Proceedings of ISSA 2005. New knowledge Today Conference. Sandton South Africa.
  3. Rabah, K. 2004. Steganography- The Art of Hiding Data. Information Technology Journal. 3(3), pp. 245-269. ISSN 1682-6027.
  4. Ker. A. 2005. Improved Detection of LSB Steganography in Grayscale Images. Lecture Notes in Computer Science. vol. 3200, pp. 97-115.
  5. Staff, CACM. 2014. Know your Steganographic Enemy. Communications of the ACM, Vol. 57 No. 5, Page 8.
  6. Kaur, S. , Bansal, S. , Bansal, R. K. 2014. Steganography and classification of image steganography techniques. International Conference on Computing for Sustainable Global Development (INDIACom). pp. 870-875.
  7. Johnson, N. F. and Jajodia, S. 1998. Steganalysis of Images Created Using Current Steganography Software. Information Hiding. Springer. Lecture Notes in Computer Science. Volume 1525, pp. 273-289.
  8. Thangadurai, K. , Sudha Devi, G. 2014. An analysis of LSB based image steganography techniques. International Conference on Computer Communication and Informatics (ICCCI). pp. 1-4.
  9. Bender, W. , Gruhl, D. , Morimoto, N. and Lu, A. 1996. Techniques for data hiding. IBM Systems Journal. vol. 35, no. 3. 4, pp. 313-336.
  10. Wang, H. and Wang, S. 2004. Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM. 47:10.
  11. Marvel, L. M. , Boncelet Jr. , C. G. and Retter, C. 1999. Spread Spectrum Steganography. IEEE Transactions on image processing. 8:08.
  12. Ge Huayong, Huang Mingsheng, Wang Qian 2011. Steganography and steganalysis based on digital image. 4th International Congress on Image and Signal Processing (CISP). vol. 1, pp. 252-255.
  13. Jambhekar, N. D. , Dhawale, C. A. and Hegadi, R. 2014. Performance Analysis of Digital Image Steganographic Algorithm. ICTCS '14 Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies. Udaipur, Rajasthan, India, Article No. 82. ACM.
  14. Johnson, N. and Katzenbeisser, S. 2000. A Survey of steganographic techniques. Information Hiding. Artech House, pp. 43-78.
  15. Siper, A. , Farley, R. and Lombardo, C. 2005. The Rise of Steganography. Proceedings of Student/Faculty Research Day. CSIS. Pace University.
  16. Judge, J. C. 2001. Steganography: Past, Present, Future. SANS Institute.
  17. Bilal, I. , Roj, M. S. , Kumar, R. and Mishra, P. K. 2014. Recent advancement in audio steganography. International Conference on Parallel, Distributed and Grid Computing (PDGC). pp. 402-405.
  18. Zieli?ska, E. , Mazurczyk, W. and Szczypiorski, K. 2014. Trends in Steganography. Communications of the ACM, Vol. 57 No. 3, Pages 86-95.
  19. Petitcolas, A. P. , Fabien, R. J. , Anderson, M. G. , Kuhn 1999. Information hiding-a survey. Proceedings of the IEEE. vol. 87, no. 7, pp. 1062, 1078.
  20. Kessler, G. C. 2004. An Overview of Steganography for the Computer Forensics Examiner. FBI Forensic Science Communications. 6(3).
  21. Richer, P. 2003. Steganalysis: Detecting hidden information with computer forensic analysis. SANS Institute InfoSec Reading Room.
  22. Fridrich, J. 2004. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. Proc. of the 6th Information Hiding Workshop. Springer, vol. 3200, pp. 67-81.
  23. Kharrazi, M. , Sencar, H. T. and Memon, N. 2006. Cover selection for steganographic embedding. In proceedings of IEEE International Conference on Image Processing. pp. 117-120.
  24. Amin, M. M. , Salleh, M. , Ibrahim, S. , Katmin, M. R. and Shamsuddin, M. Z. I. 2003. 4th National Conference on Information hiding using steganography Telecommunication Technology NCTT Proceedings IEEE. pp. 21-25.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Attacks Steganalysis.