Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis

Print
PDF
IJCA Proceedings on National Seminar on Recent Advances in Wireless Networks and Communications
© 2014 by IJCA Journal
NWNC - Number 3
Year of Publication: 2014
Authors:
Pooja Rawat
Amit Kumar Pandey
Shiv Pratap Singh Kushwah

Pooja Rawat, Amit Kumar Pandey and Shiv Pratap Singh Kushwah. Article: Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis. IJCA Proceedings on National Seminar on Recent Advances in Wireless Networks and Communications NWNC(3):31-35, April 2014. Full text available. BibTeX

@article{key:article,
	author = {Pooja Rawat and Amit Kumar Pandey and Shiv Pratap Singh Kushwah},
	title = {Article: Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis},
	journal = {IJCA Proceedings on National Seminar on Recent Advances in Wireless Networks and Communications},
	year = {2014},
	volume = {NWNC},
	number = {3},
	pages = {31-35},
	month = {April},
	note = {Full text available}
}

Abstract

We all are familiar about Steganography. We know that Steganography is a skill of hiding any information with invisible existence inside other objects, which are known as cover objects. These cover objects can be protocol, audio, video, text, image etc. Today HTML pages and spam emails are also being used for Steganography. With the help of Steganography we can hide the information which is paramount and confidential for us. In comparison to the bulk of papers that examines either Steganography or Steganalysis techniques; this paper gives deeply description of both image Steganography breaking strategies of them. It also discusses that which image format is most appropriate or best for our algorithm and how can we perform compression on that. The paper can therefore be divided into many parts and all parts of this paper will be very beneficial for readers'.

References

  • T Morkel, J. H. P Eloff, M. S Olivier, "an overview of image Steganography". Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), 2005.
  • Krenn, R. , "Steganography and Steganalysis", http://www. krenn. nl/univ/cry/steg/article. pdf
  • Paula Aguilera, "Comparison of different image compression formats". ECE 533 Project Report.
  • Pao-Yen Lin, "Basic Image Compression Algorithm and Introduction to JPEG Standard".
  • Wei-Yi Wei, "An Introduction to Image Compression.
  • V. Lokeshwara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats". Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872(2011).
  • Philip Bateman, Dr. Hans Georg Schaathun, "Image Steganography and Steganalysis". University of Surrey, Department of Computing.
  • Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt , "Enhancing Steganography in Digital Images". Canadian Conference on Computer and Robot Vision. 978-0-7695-3153-3/08. 2008 IEEE.
  • Roy, Ratnakirti ; Changder, Suvamoy ; Sarkar, Anirban ;Debnath, Narayan C,"Evaluating Image Steganography techniques: future research challenges". Computing ,Management and Telecommunications (ComManTel), 2013 International Conference.
  • Adnan Abdul-Aziz Gutub, "Pixel Indicator Technique for RGB Image Steganography". Journal of emerging technologies in web intelligence, Volume 2, no. 1, February 2010.
  • Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen, Aleem Alvi, "Pixel Indicator High Capacity Technique For RGB Image Based Steganography".
  • Tasnuva Mahjabin, Syed Monowar Hossain, Md. Shariful Haque, "A Block Based data Hiding Method in Images using Pixel Value Differencing and LSB Substitution Method". 978-1-4673-4836-2/12. IEEE 2012.
  • Juan Jo? Roque, Jesús María Minguet, "SLSB: Improving the Steganographic Algorithm LSB".
  • Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung, "Image Steganography and Steganalysis: A Survey". International Journal of Computer Applications (0975-8887). Volume 52- No. 2, August 2012.
  • Medha Kulkarni, Dr. J. W. Bakal, "Hide and Seek in JPEG Images" . International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 4, July-August 2012, pp. 1634-163