A PRAGMATIC STUDY OF STEGANOGRAPHY- AN ART OF HIDING DATA STEGANOGRAPHY- AN ART OF HIDING DATA

Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)

Format: Volume 5, Issue 1, No 22, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: Dr. C.BHUVANESWARI,S.DAISY FATIMA MARY

Reference:IJCS-262

View PDF Format

Abstract

The art of sending and displaying the hidden information has especially received more attention and faced many challenges. Steganography deals with hiding the available communicated data in such a way that it remains confidential. Usually the data covered is achieved by the means of image, text, communication, voice or multimedia military communication, content for copyright, authentication and many other purposes. This paper deals with the complete overview of the steganography its requirements, various methods of the steganography, its classifications and the various techniques used in the study. Finally the applications of the steganography are discussed in this work

References

[1] Mohammad Shirali-Shahreza , “A new method for real time steganography”, Proceedings of IEEE, ICSP 2006 . [2]. Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, “Steganography and digital watermarking” School of Computer Science, The University of Birmingham. 2003. [3] J.C.Judge, F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn” Steganography: past, present, future Informatics”, SANS Institute publication, 2001. [4] Jan Kodovsky and J. Fridrich, Influence of embedding strategies on security of steganographic methods in the jpeg domain, Proc. of IST/SPIE Electronic Imaging: Security, Forensics, Steganography Contents X, vol. 6819, pp. 1-13, 2008. [5] M.H. Shirali-Shahreza and M. Shirali-Shahreza. Text steganography in chat. In Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Interne the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007), Tashkent, Uzbekistan, September 26-28, 2007. [6] Chen Ming ,Zhang Ru, Niu Xinxin,Yang Yixian, “Analysis of current steganography tools: Classification & features” ,Information security center, Beijing University.China,2014 . [7] S. Katzenbeisser, F.A.P. Petitcolas (Ed.), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, ISBN 1-58053- 035-4, 2000. Proceedings of 2001 International Conference on Image Processing,

Keywords

Authentication, Copyright, Communication, Information, Multimedia.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog