Steganography Techniques - An Overview

Authors

  • Amitava Podder  Department of Computer Science & Engineering, Brainware University, Barasat, West Bengal, India
  • Piyal Roy  Department of Computer Science & Engineering, Brainware University, Barasat, West Bengal, India
  • Smaranika Roy  Department of Computer Science, Sarada Ma Girls' College, Barasat, West Bengal, India

DOI:

https://doi.org//10.32628/CSEIT228642

Keywords:

Digital Image Steganography, Spatial Domain, Frequency Domain, Adaptive Steganography, Security

Abstract

Cryptography, or the use of code, has a sinister relative called steganography. Steganography is supposed to offer confidentiality whereas encryption is said to provide privacy. A method of concealed communication is steganography. The process of steganography involves hiding a message in a suitable carrier, such as an image or audio file, which can then be transported to the receiver without anybody being aware that it contains a hidden message. This is a method that civil rights organizations in oppressive states, for instance, might utilize to propagate their message without the knowledge of their own government. This paper aims to discuss different techniques for implementing steganography to multimedia files (text, still images, audio, and video).

References

  1. Johnson, N. F. and Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2):26–34.
  2. Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography model for promoting global cyber security. In, 2009 Proceedings of International Conference on Systemics, Cybernetics and Informatics, Hyderabad, India.
  3. Niels Provos, Peter Honeyman, Hide and Seek: Introduction to Steganography (2003).
  4. Biswas, S.K., Podder, A. (2022). "Path Minimization Planning and Cost Estimation of Passive Optical Network Using Algorithm for Sub-optimal Deployment of Optical Fiber Cable". In: Mitra, M., Nasipuri, M., Kanjilal, M.R. (eds) Computational Advancement in Communication, Circuits and Systems. Lecture Notes in Electrical Engineering, vol 786. Springer, Singapore. https://doi.org/10.1007/978-981-16-4035-3_7.
  5. Silman, J., “Steganography and Steganalysis: An Overview”, 2001 SANS Institute.
  6. Westfeld, A. (2001). F5-a steganographic algorithm: High capacity despite better steganalysis. In Proc. 4th Int’l Workshop Information Hiding, pages 289–302.
  7. Nasir Memon R. Chandramouli. Analysis of lsb based image steganography techniques. In, 2001 Proceedings of IEEE ICIP.
  8. Amitava Podder, Satyaki Kumar Biswas. "Energy-Efficient Passive Optical Network (PON) Planning with Wavelength Allocation Scheme based on User Behaviors and Bit Error Rate (BER) Performance Evaluation", International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319-6734, ISSN (Print): 2319-6726 www.ijesi.org ||Volume 10 Issue 2 Series I || February 2021 || PP 01-11 || Journal DOI- 10.35629/6734.

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
Amitava Podder, Piyal Roy, Smaranika Roy, " Steganography Techniques - An Overview, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 6, pp.323-327, November-December-2022. Available at doi : https://doi.org/10.32628/CSEIT228642