National Seminar on Recent Advances in Wireless Networks and Communications |
Foundation of Computer Science USA |
NWNC - Number 3 |
April 2014 |
Authors: Pooja Rawat, Amit Kumar Pandey, Shiv Pratap Singh Kushwah |
ac0f8890-fa35-4b34-ad75-b3e64e6f4a2e |
Pooja Rawat, Amit Kumar Pandey, Shiv Pratap Singh Kushwah . Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis. National Seminar on Recent Advances in Wireless Networks and Communications. NWNC, 3 (April 2014), 31-35.
We all are familiar about Steganography. We know that Steganography is a skill of hiding any information with invisible existence inside other objects, which are known as cover objects. These cover objects can be protocol, audio, video, text, image etc. Today HTML pages and spam emails are also being used for Steganography. With the help of Steganography we can hide the information which is paramount and confidential for us. In comparison to the bulk of papers that examines either Steganography or Steganalysis techniques; this paper gives deeply description of both image Steganography breaking strategies of them. It also discusses that which image format is most appropriate or best for our algorithm and how can we perform compression on that. The paper can therefore be divided into many parts and all parts of this paper will be very beneficial for readers'.