Overview on Various Techniques Developed In Steganography By Different Agencies

Authors

  • Arpana Chaturvedi  Jagannath International Management School, Vasant Kunj, Delhi, India
  • Poonam Verma  Jagannath International Management School, Vasant Kunj, Delhi, India

Keywords:

Steganography, Watermarking, Online Signature, LSB

Abstract

In the era of ICT, every stream needs to use the online transactions. Although the citizens of the developed nations are at ease to work with it, however the citizens of the developing nations are still struggling to handle the same. The basic reason behind the lack of ease to work with the online transactions is the security issues of it. In this paper, we have discussed the concept of steganography, which has been popularly used. We have also given an overview of the various techniques developed by different agencies to make it more secure and not only use it for the basic images but also for secure storage and linkage , along with the watermarking techniques.

References

  1. B. Dunbar, 'A detailed look at Steganographic Techniques and their use in an Open-Systems Environment', Sans Institute: Information Security Reading Room, 2002.
  2. E. Kawaguchi, 'Applications of Steganography', Datahide.org, 2015. [Online]. Available: http://datahide.org/BPCSe/applications-e.html. [Accessed: 05- Apr- 2015].
  3. G. Kessler, 'An Overview of Steganography for the Computer Forensics Examiner', Garykessler.net, 2014. [Online]. Available: http://www.garykessler.net/library/fsc_stego.html. [Accessed: 05- Apr- 2015].
  4. C. Oliboni, OpenPuff. EmbeddedSW.net, 2012. http://embeddedsw.net/OpenPuff_Steganography_Home.html
  5. E. Zukerman, 'Review: OpenPuff steganography tool hides confidential data in plain sight',  PCWorld, 2015. [Online]. Available: http://www.pcworld.com/article/2026357/review-openpuff-steganography-tool-hides-confidential-data-in-plain-sight.html. [Accessed: 05- Apr- 2015].
  6. A. Abdel-Raouf, 'Picture, Java Files'.
  7. J. Judge, 'Steganography: Past, Present,
  8. Future', Sans.org, 2001. [Online]. Available: http://www.sans.org/reading-room/whitepapers/stenganography/steganography-past-present-future-552. [Accessed: 04- May- 2015].A. Davidson, 'Java Art Chapter 6. Steganography', Java Prog. Techniques for Games., 2009. http://fivedots.coe.psu.ac.th/~ad/jg/javaArt6/stego.pdf

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Arpana Chaturvedi, Poonam Verma, " Overview on Various Techniques Developed In Steganography By Different Agencies, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.895-899, November-December-2017.