A Review of Approaches for Steganography
Keywords:
Steganography, image-audio-video-text SteganographyAbstract
Steganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper�s suspicion. Many different carrier file formats are used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
References
N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26–34.
J.C.Judge, Steganography: past, present, future. SANS Institute publication, <http://www.sans.org/ reading room/ whitepapers/ stenganography/ 552.php>, 2001
F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn:”Information Hiding- A Survey”, Process of IEEE, vol.87,no.7, pp.1062-1078, July, 1999.
Artz D (2001). “Digital steganography: hiding data within data” Internet Computing. IEEE, 5(3): 75-80 [5] Derek Upham, Jsteg, http://zooid.org/ Paul/crypto/jsteg.
Nassir Memon R. Chandramouli. Analysis of lbs. based image steganography techniques. In Proceedings of IEEE ICIP, 2001.
R. Chandramouli, Nassir Memon, “Analysis of LSB Based Image Steganography Techniques”, IEEE 2001. [8] K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, Steganalysis of quantization index modulation data hiding, Proc. of 2004 IEEE International Conference on Image Processing, vol. 2, pp. 1165-1168, 2004.
Jar no Mielikainen, "LSB Matching Revisited", Signal Processing Letters, IEEE, Publication Date: May 2006 Volume : 13, Issue : 5, pp. 285- 287
K. Gopalan. Audio steganography using bit modification. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP ’03), volume 2, pages 421–424, 6-10 April 2003.
N. Johnson, Survey of Steganography Software, Technical Report, January 2002.
W. Peter. Disappearing Cryptography: Information Hiding: Steganography and watermarking (second edition). San Francisco: Margan Kaufmann.
Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
Krenn, R., “Steganography and Steganalysis”, http://www.krenn.nl/univ/cry/steg/article.pdf
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
