Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego-image (generated image which is carrying a hidden message). In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.
Communications on Applied Electronics, 2016
Transmitting confidential images between two channels suffer from hacking. Therefore, protecting confidentiality has become a very essential issue. Recently, several methods are developed to protect important information. The main idea is based on embedding important information in multimedia carrier such as: text, image, audio, and video. The developed methods may be classified as steganography and watermarking. Steganography aims to embed huge amount of secret data in multimedia carrier while watermarking aims to hid small amount of secret data in multimedia carrier. This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.
Steganography is a secret Communication to hide the secret Data. It is an invisible communication that hides data like text, image, and audio, video etc .The secret message is inserted into the image files. The image files can use stego-key to hide the data and the resultant image is called as stego-image. This is most important for the internet users to share their secret data in an efficient manner. Steganography plays an important role in defence. Various steganographic techniques are analyzed and its pros and cons are highlighted in this paper.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stegoimage (generated image which is carrying a hidden message). In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.
Steganography is an art for hiding the secret information inside other information which are digitally cover. The definition of steganography can also be given as study of unseen communication that usually deals with existence of communicated message. The hidden message can be text, audio, image or video accordingly to that it can be cover from either image or video. In steganography, hiding information achieved to insert a message into cover image which generates a stego image. In this paper, we have analyze various steganography methods and also covered classification and applications.
2011
Abstract:-Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data.
—Data has become vulnerable to attackers and viruses so that security of the data has become main purpose now days. The steganography is a proficient technique to secure the data and has a long history but now the steganography has changed a lot. In modern steganography the digital carrier, electronic text, disk space, network packets, digital images, digital videos, digital audio etc are used for hiding the data. This study is organized with an objective to have an overview to steganography and its various types. The techniques for image steganography are also discussed in this work.
2012
As the network technology grows it is necessary to achieve the security of data during communication through the network. In everyday life we use internet for sending our important data through network to the destination but during these communication our important data may accessed by some unauthorized persons so to overcome this problems we can use Steganography for sending our important information. In this paper we have presented a detail look of Steganography and compare Steganography with other security techniques like cryptography and digital watermarking. In this paper we also discussed about different techniques used in recent Steganography researches.
With the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. So in this digital scenario invisible communication between two parties is the prime concern. Steganography is the technique of hidden communication. It not only hides the message contents, instead it hides the existence of the message. In this paper, a new image steganography method based on spatial domain is proposed secret data hided in image segments using least significant bit (LSB) steganography is proposed. The color image is divided into four equal parts and the secret data is also divided into four equal parts and those divided data is hided in the image segments using least significant bit steganography. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.
International Conference …, 2008
The growth of high speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension -use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Security is becoming an inseparable part of Data Communication. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. This paper is a tutorial review of the steganography techniques appeared in the literature.
akram dawood, 2019
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. Steganography-the art and science of hiding information into the other information so that the hidden information appears to be nothing to the human eyes has gained much attention. There are many ways to hide information inside an image, audio/video, document etc. But Image Steganography has its own advantages and is most popular among the others. This paper includes the important steganography methods and the main focus is on the review of steganography in digital images steganographic techniques in spatial domain such as least significant bit (LSB), pixel value differencing (PVD). The different aspects on which the steganography method depends are: robustness, capacity, undetectability. Keywords Steganography, Least significant bit (LSB), Pixel value differencing (PVD), Capacity, Stego-image, cover-image 1. Introduction Over the last two decades, the rapid development of internet requires confidential information that needs to be protected from the unauthorized users. This is accomplished through Data hiding. It is a method of hiding secret messages into a cover medium so that an unintended observer will not be aware of the existence of the hidden messages. This is achieved by steganography. The term steganography is retrieved from the Greek words stegos means cover and grafia meaning writing defining it as covered writing.[1]. Steganography is a technology that is used to hide secret information in digital media, thus hiding the fact that secret communication is taking place. By hiding secret information in less suspicious digital media, well-known channels, for example e-mail and social networking sites, are avoided, thereby reducing the risk of information being leaked in transit. Steganography is a technology concerned with ways of embedding a secret message in a cover message also known as a cover object in such a way that the existence of the embedded information is hidden. A secret message can be plaintext, ciphertext, an image, or anything that can be represented as a bit stream. The embedding process is sometimes parameterised by a secret key, called a stego key, and without knowledge of this key it is difficult for an unauthorised party to detect and extract the secret message. Once the cover object has information embedded in it, it is called a stego object. Steganography equation is 'Stego-medium = Cover medium + Secret message + Stego key. Theg eneral model
2017
This paper describes the basic knowledges about steganography and specially the field of image steganography. I have attached the definition of image, steganography and image steganography and different types of it. After that I have given a short passage about the survey of steganography with its related work. And mostly at the end I have added some of my proposed work, consisting block diagram, flowchart and algorithm with a short description with pictorial representation with future scopes.
With the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. So in this digital scenario invisible communication between two parties is the prime concern. Steganography is the technique of hidden communication. It not only hides the message contents, instead it hides the existence of the message. In this paper, a new image steganography method based on spatial domain is proposed secret data hided in image segments using least significant bit (LSB) steganography is proposed. The color image is divided into four equal parts and the secret data is also divided into four equal parts and those divided data is hided in the image segments using least significant bit steganography. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
2019
The evolving of Internet technology has achieved to the need of high level of data safety during its spread. For this purpose steganography shows a main role in society. Steganography is mostly the art of secretly hiding data or message in any cover media such as an image, audio or video. Hence it allows secret communiqué to take place without the information of any unintended user. This article gives a brief overview of image steganography and the techniques used for hiding data in the original image to get stego-image. The estimate of performance is based on the PSNR value.The aim of Steganography is to maintain secret communication between two events. This paper shows how Steganography is used in a new situation while providing a practical understanding of what Steganography is and how to complete it. In this research there exists a large change of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different techniq...
MATEC Web of Conferences, 2016
Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is the technology that attempts to ruin the Steganography by detecting the hidden information and extracting. Steganography is the process of Data embedding in the images, text/documented, audio and video files. The paper also highlights the security improved by applying various techniques of video steganography.
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. Steganography is the art of hiding information in ways that prevent detection. The Steganography used to transport information from one place to other place through public channel in covert way. Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of Steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the Steganography technique used. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
For increase network security of messages sent on internet the steganography is mostly preferred. To transmit data secretly steganography is used in open system environment. In this paper discussed the reviews of image steganography and the general framework of image steganography using different method. Steganography is nothing but art of hide information behind the other information without leaving remarkable track on original message.
International Journal of Modern Trends in Engineering and Research, 2014
In today’s world the art of sending & displaying the hidden information especially in public places, has received more attention. And so it has to face many challenges. Therefore, different methods have been developed so far for hiding information in different cover media. Steganography is the art and science of invisible communication which takes place between two different entities. This is done by hiding the information in other information. It is the way of hiding the existence of the communicated information. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information. Steganography is different from cryptography. Cryptography focuses on keeping the contents of a message secret, while steganography focuses on keeping the existence of a message secret [4]. This paper intends to give an overview of security systems with a main concentration on steganography, its uses and techniques.
international journal for research in applied science and engineering technology ijraset, 2020
Steganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others. Therefore, the goal is to hide the existence of the secret data. Using steganography techniques, secret data can be concealed within an appropriate multimedia carrier, such as, image, audio, text files; among which digital image is the most widely used carrier format. Different steganography techniques are available, some are more advanced than the others, having strong and weak points respectively. The suitable technique can be selected as per the application requirement. The main objectives of steganography are undetectability, untraceable, robustness, and capacity of secret data. These are the factors that make it different from techniques such as cryptography. This paper analysis the uses of steganography and its techniques. It additionally aims to determine which steganography technique is more suitable for a certain application.
IJRCAR, 2014
In this paper we study different Steganography techniques for encrypting the information. Steganography is a technique which allows secreting information or data into the image. This paper discusses the concept at the back of Steganography by exploring firstly what is the Steganography and the terms that are associated the Steganography. This paper explores the Steganography methods – image Steganography, audio Steganography, video Steganography, text Steganography that are used to embed the information in digital carriers. The two most important aspects of image based Steganography system are the quality of stego image and the capacity of the cover image. By reviewing this paper, researchers can enlarge a better Steganography technique to increase the MSE, BER and PSNR value by analyzing the existing Steganalysis techniques.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.