Ancient and Modern Steganography

  • Saugata Dutta Galgotias University
Keywords: steganography, wax tablet, cryptography, microdots

Abstract

Steganography is an art of putting information in a medium without causing significant and statistically difference in the medium. The word steganography conjoins words “steganos” which means covert and “graphein” meaning writing, which means hidden writing. Steganography is although not a new art and had been used during the ancient times. The steganography process has changed from ancient times to digital age but the concept remained the same. This paper will discuss on various methods used during ancient times and evolution and used in recent times.

References

[1] http://en.wikipedia.org/wiki/Steganography
[2] Gustavus, J. Simmons., "The Prisoners' Problem and the Subliminal Channel", in Proceedings of CRYPTO '83, pp 51-67. Plenum Press (1984).
.
[3] Saini, Manisha. and Saini, Gaurav., “Steganography and tools used for steganography”, International journal of scientific and engineering research, January 2014, pp. 1693-1697.
[4] Cheddad, Abbas., Condell, Joan., Curran, Kevin., and Kevitt, Mc. Paul., “Digital image steganography: Survey and analysis of current methods”, Signal Processing, 2010, pp. 727-752.
[5] Kaur, Navneet., and Behal, Sunny., “A Survey on various types of steganography and analysis of hiding techniques”, International journal of engineering trends and technology, May 2014, pp. 388-392.
[6] Bassil, Youssef. (2012). A Text Steganography Method using pangram and image mediums. International Journal of Scientific and Engineering research. 3 (2).
[7] Kumar, Mahesh. and Yadav, Munesh., (2014). Image Steganography Using Frequency Domain. International Journal of Scientific & Technology Research. 3 (9). 226-230
[8] Hussain, Mehdi. and Hussain, Mureed., “A Survey of Image Steganography Techniques”, International Journal of Advance Science and Technology, May 2013.
[9] Sharma, Anshu., and Sharma, Deepti., “Research on Analysis of Different Image Steganography Techniques”, International Journal of Engineering Sciences and Research Technology, June 2014, pp. 570-577.
[10] Judge, C. James., “Steganography: Past”, Present, Future Sans Institute, 2001.
[11] Patel, V. Z., and Gadhiya, A. S., “A Survey paper on Steganography and cryptography”, International multidisciplinary Research Journal, May 2015.
[12] Lu, Yao. (2014). Investigating Steganography in Audio Stream for Network Forensic Investigations: Detection and Extraction, Master of Forensic Information Technology, AUT University, Auckland, New Zealand.
[13] http://www.unmuseum.org/nazca.htm
[14] https://en.wikipedia.org/wiki/Johannes_Trithemius
[15] https://en.wikipedia.org/wiki/Cardan_grille
[16] http://www.freeprojectscode.com/java-projects/image-steganography/2158/
[17] http://www.yuvaengineers.com/decimated-wavelet-with-spread-spectrum-approach-for-audio-steganography-b-venkata-ramana-naik-p-s-s-sumapriya/
[18] http://www.slideshare.net/ShajanaKBasheer/video-steganography-46652967
[19] http://stegano.net/tutorial/steg-history.html
Published
2018-05-15
How to Cite
Dutta, S. (2018). Ancient and Modern Steganography. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 2(2). Retrieved from http://asianssr.org/index.php/ajct/article/view/486
Section
Computer Science and Engineering

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.