Book Details

A PRAGMATIC STUDY OF STEGANOGRAPHY- AN ART OF HIDING DATA STEGANOGRAPHY- AN ART OF HIDING DATA

IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

The art of sending and displaying the hidden information has especially received more attention and faced many challenges. Steganography deals with hiding the available communicated data in such a way that it remains confidential. Usually the data covered is achieved by the means of image, text, communication, voice or multimedia military communication, content for copyright, authentication and many other purposes. This paper deals with the complete overview of the steganography its requirements, various methods of the steganography, its classifications and the various techniques used in the study. Finally the applications of the steganography are discussed in this work

References

[1] Mohammad Shirali-Shahreza , “A new method for real time steganography”, Proceedings of IEEE, ICSP 2006 .

[2]. Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, “Steganography and digital watermarking” School of Computer Science, The University of Birmingham. 2003.

[3] J.C.Judge, F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn” Steganography: past, present, future Informatics”, SANS Institute publication, 2001.

[4] Jan Kodovsky and J. Fridrich, Influence of embedding strategies on security of steganographic methods in the jpeg domain, Proc. of IST/SPIE Electronic Imaging: Security, Forensics, Steganography Contents X, vol. 6819, pp. 1-13, 2008.

[5] M.H. Shirali-Shahreza and M. ShiraliShahreza. Text steganography in chat. In Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Interne the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007), Tashkent, Uzbekistan, September 26-28, 2007.

[6] Chen Ming ,Zhang Ru, Niu Xinxin,Yang Yixian, “Analysis of current steganography tools: Classification & features” ,Information security center, Beijing University.China,2014 .

 [7] S. Katzenbeisser, F.A.P. Petitcolas (Ed.), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, ISBN 1-58053- 035-4, 2000. Proceedings of 2001 International Conference on Image Processing, Thessaloniki, Greece, 2001, pp. 542–545.

Keywords

Authentication, Copyright, Communication, Information, Multimedia.

Image
  • Format Volume 5, Issue 1, No 22, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author Dr. C.BHUVANESWARI, S.DAISY FATIMA MARY
  • Reference IJCS-262
  • Page No 1673-1677

Copyright 2024 SK Research Group of Companies. All Rights Reserved.