Overview on Various Techniques Developed In Steganography By Different Agencies

Authors(2) :-Arpana Chaturvedi, Poonam Verma

In the era of ICT, every stream needs to use the online transactions. Although the citizens of the developed nations are at ease to work with it, however the citizens of the developing nations are still struggling to handle the same. The basic reason behind the lack of ease to work with the online transactions is the security issues of it. In this paper, we have discussed the concept of steganography, which has been popularly used. We have also given an overview of the various techniques developed by different agencies to make it more secure and not only use it for the basic images but also for secure storage and linkage , along with the watermarking techniques.

Authors and Affiliations

Arpana Chaturvedi
Jagannath International Management School, Vasant Kunj, Delhi, India
Poonam Verma
Jagannath International Management School, Vasant Kunj, Delhi, India

Steganography, Watermarking, Online Signature, LSB

  1. B. Dunbar, 'A detailed look at Steganographic Techniques and their use in an Open-Systems Environment', Sans Institute: Information Security Reading Room, 2002.
  2. E. Kawaguchi, 'Applications of Steganography', Datahide.org, 2015. [Online]. Available: http://datahide.org/BPCSe/applications-e.html. [Accessed: 05- Apr- 2015].
  3. G. Kessler, 'An Overview of Steganography for the Computer Forensics Examiner', Garykessler.net, 2014. [Online]. Available: http://www.garykessler.net/library/fsc_stego.html. [Accessed: 05- Apr- 2015].
  4. C. Oliboni, OpenPuff. EmbeddedSW.net, 2012. http://embeddedsw.net/OpenPuff_Steganography_Home.html
  5. E. Zukerman, 'Review: OpenPuff steganography tool hides confidential data in plain sight',  PCWorld, 2015. [Online]. Available: http://www.pcworld.com/article/2026357/review-openpuff-steganography-tool-hides-confidential-data-in-plain-sight.html. [Accessed: 05- Apr- 2015].
  6. A. Abdel-Raouf, 'Picture, Java Files'.
  7. J. Judge, 'Steganography: Past, Present,
  8. Future', Sans.org, 2001. [Online]. Available: http://www.sans.org/reading-room/whitepapers/stenganography/steganography-past-present-future-552. [Accessed: 04- May- 2015].A. Davidson, 'Java Art Chapter 6. Steganography', Java Prog. Techniques for Games., 2009. http://fivedots.coe.psu.ac.th/~ad/jg/javaArt6/stego.pdf

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 895-899
Manuscript Number : CSEIT1726220
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Arpana Chaturvedi, Poonam Verma, "Overview on Various Techniques Developed In Steganography By Different Agencies", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.895-899, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT1726220

Article Preview