Steganography Techniques - An Overview
DOI:
https://doi.org//10.32628/CSEIT228642Keywords:
Digital Image Steganography, Spatial Domain, Frequency Domain, Adaptive Steganography, SecurityAbstract
Cryptography, or the use of code, has a sinister relative called steganography. Steganography is supposed to offer confidentiality whereas encryption is said to provide privacy. A method of concealed communication is steganography. The process of steganography involves hiding a message in a suitable carrier, such as an image or audio file, which can then be transported to the receiver without anybody being aware that it contains a hidden message. This is a method that civil rights organizations in oppressive states, for instance, might utilize to propagate their message without the knowledge of their own government. This paper aims to discuss different techniques for implementing steganography to multimedia files (text, still images, audio, and video).
References
- Johnson, N. F. and Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2):26–34.
- Souvik Bhattacharyya. and Gautam Sanyal. An image based steganography model for promoting global cyber security. In, 2009 Proceedings of International Conference on Systemics, Cybernetics and Informatics, Hyderabad, India.
- Niels Provos, Peter Honeyman, Hide and Seek: Introduction to Steganography (2003).
- Biswas, S.K., Podder, A. (2022). "Path Minimization Planning and Cost Estimation of Passive Optical Network Using Algorithm for Sub-optimal Deployment of Optical Fiber Cable". In: Mitra, M., Nasipuri, M., Kanjilal, M.R. (eds) Computational Advancement in Communication, Circuits and Systems. Lecture Notes in Electrical Engineering, vol 786. Springer, Singapore. https://doi.org/10.1007/978-981-16-4035-3_7.
- Silman, J., “Steganography and Steganalysis: An Overview”, 2001 SANS Institute.
- Westfeld, A. (2001). F5-a steganographic algorithm: High capacity despite better steganalysis. In Proc. 4th Int’l Workshop Information Hiding, pages 289–302.
- Nasir Memon R. Chandramouli. Analysis of lsb based image steganography techniques. In, 2001 Proceedings of IEEE ICIP.
- Amitava Podder, Satyaki Kumar Biswas. "Energy-Efficient Passive Optical Network (PON) Planning with Wavelength Allocation Scheme based on User Behaviors and Bit Error Rate (BER) Performance Evaluation", International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319-6734, ISSN (Print): 2319-6726 www.ijesi.org ||Volume 10 Issue 2 Series I || February 2021 || PP 01-11 || Journal DOI- 10.35629/6734.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.