Exploring Different Techniques in Steganography and Steganalysis

  • Saugata Dutta Galgotias University
Keywords: steganography, steganalysis, cryptography, spatial domain, universal steganalysis

Abstract

Communication has various forms and it is a significant part in our daily life starting from ancient era. Technology changes from time to time so as the mode of communication. Steganography is an art of secret communication. There are various types of steganography like text, images, audio and video. Steganalysis is a study of detecting hidden messages using steganography. This paper intends to explore different techniques used in steganography and steganalysis.

References

[1] http://en.wikipedia.org/wiki/Steganography
[2] Kumar, Mahendra. (2011). Steganography and Steganalysis of Joint Picture Expert Group Images, Doctor of Philosophy, University of Florida, United States.
[3] HOLOŠKA, Jiří. (2011). Artificial Intelligence applied on crypto analysis aimed on revealing weakness of modern cryptology and computer security, Dissertation Thesis, Tomas Bata University, Zlin, Czech Republic.
[4] Almohammad, Adel. (2010). Steganography-Based secret reliable communications: Improving steganographic capacity and imperceptibility, Doctor of Philosophy, Brunel University, United Kingdom.
[5] Al-Shatnawi, M. Atallah. (2012). A New Method in Image Steganography with improved image quality. Applied Mathematical sciences. 69 (79). 3907-3915
[6] Morran, Michael. And Weir, R.S. George. (2010). An Approach to Textual Steganography, Department of Computer and Information Sciences, University of Strathclyde, Glasgow, United Kingdom.
[7] Jyothi, B. Veera. Verma, S.M. and Uma Shanker, C. (2010). Implementation and Analysis of Email Messages Encryption and Image Steganography schemes for Image Authentication and Verification. International Journal of Computer Applications. 5 (5). 22-27
[8] Pramanik, Sabyasachi. and Bandyopadhyay, K. Samir. (2014). An Innovative Approach in Steganography. Scholar Journal of Engineering and Technology. 2 (2B). 276-280
[9] Lloyd, Patrick. (2010). An Exploration of Covert Channels within Voice Over IP, Master of Science in Network and System Administration, Rochester Institute of Technology, Rochester, United States.
[10] Meghanathan, Natarajan. and Nayak, Lopamudra. (2010). Steganalysis Algorithms for detecting the hidden information in image, audio and video cover media. International Journal of network Security and its application. 2 (1). 43-55
[11] Saddaf rubab and M Younus. Improved Image Steganography Technique for Colored Images using Wavelet Transform. International Journal of Computer Applications 39(14):29-32, February 2012. Published by Foundation of Computer Science, New York, USA.
Published
2018-05-15
How to Cite
Dutta, S. (2018). Exploring Different Techniques in Steganography and Steganalysis. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 2(2). Retrieved from https://asianssr.org/index.php/ajct/article/view/487
Section
Information Technology

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.