Overview on Various Techniques Developed In Steganography By Different Agencies
Keywords:
Steganography, Watermarking, Online Signature, LSBAbstract
In the era of ICT, every stream needs to use the online transactions. Although the citizens of the developed nations are at ease to work with it, however the citizens of the developing nations are still struggling to handle the same. The basic reason behind the lack of ease to work with the online transactions is the security issues of it. In this paper, we have discussed the concept of steganography, which has been popularly used. We have also given an overview of the various techniques developed by different agencies to make it more secure and not only use it for the basic images but also for secure storage and linkage , along with the watermarking techniques.
References
- B. Dunbar, 'A detailed look at Steganographic Techniques and their use in an Open-Systems Environment', Sans Institute: Information Security Reading Room, 2002.
- E. Kawaguchi, 'Applications of Steganography', Datahide.org, 2015. [Online]. Available: http://datahide.org/BPCSe/applications-e.html. [Accessed: 05- Apr- 2015].
- G. Kessler, 'An Overview of Steganography for the Computer Forensics Examiner', Garykessler.net, 2014. [Online]. Available: http://www.garykessler.net/library/fsc_stego.html. [Accessed: 05- Apr- 2015].
- C. Oliboni, OpenPuff. EmbeddedSW.net, 2012. http://embeddedsw.net/OpenPuff_Steganography_Home.html
- E. Zukerman, 'Review: OpenPuff steganography tool hides confidential data in plain sight', PCWorld, 2015. [Online]. Available: http://www.pcworld.com/article/2026357/review-openpuff-steganography-tool-hides-confidential-data-in-plain-sight.html. [Accessed: 05- Apr- 2015].
- A. Abdel-Raouf, 'Picture, Java Files'.
- J. Judge, 'Steganography: Past, Present,
- Future', Sans.org, 2001. [Online]. Available: http://www.sans.org/reading-room/whitepapers/stenganography/steganography-past-present-future-552. [Accessed: 04- May- 2015].A. Davidson, 'Java Art Chapter 6. Steganography', Java Prog. Techniques for Games., 2009. http://fivedots.coe.psu.ac.th/~ad/jg/javaArt6/stego.pdf
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.