Data Hiding in Image by Optimal Random Substitution
Keywords:
Steganography, Spatial Domain, Transform DomainAbstract
The importance of reducing a chance of the Information being detected during the transmission is being an issue now days. Some solution to be discussed is how to pass information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Steganography comes from Greek and literally means ‘Covered writing’. Steganography is closely related to hidden channel scheme. It is the art and science of writing of hidden message in such a way that no one apart of intended recipients knows the existence of message. Steganography is often confused with cryptography because the two are almost similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. Applications of both are in the field of communication system, Steganography coding inside transport layer such as an MP3 file and in the defence system.
References
YambemJinaChanu, Themrichon Tuithung, Kh. Manglem Singh “short survey on image steganography and steganalysis techniques” ,978-1-4577-0748-3/ 2012 IEEE.
GeHuayong , Huang Mingsheng, Wang Qian, “Steganography and steganalysis based on digital images “978-1-4244-9306-7 2011IEEE conference on image and signal processing.
Vijay Kumar,Dinesh Kumar, “Performance evaluation of DWT based image steganography” 223-228 ,2010 IEEE 2nd international advance computing conference .
R.Amrittharajan,Sandeepkumarbehera,AbhilashSwarup, ”Colour guided colour image steganography “ universal journal of computer science and engineering technology 16-23,oct. 2010
Prabakran.G, Bhavani.R “ A modified secure digital image steganography based on discrete wavelet transform”, 1096-1100, 2012 IEEE
Chi-Kwong Chan∗, L.M. Cheng “Hiding data in image by simple LSb substitution”, the journal of the pattern recognition society, pattern recognition 37(2004) 469-474
R.Amritharajan,r.akila,P.Deepikachowdavarapu,”A comparative analysis of image Steganography” international journal of computal applications (0975-8887) ,volume 2-No.3,May-2010.
W.Bender,D.Garhul,N.Morimoto,A.Lu,” Techniques for data hiding” IBM System journal VOL.35,NOS 3&4,199
Hide and seek: An introduction to steganography, 1540- 7993,2003 IEEE security and privacy
SANS institute infosec reading room :steganography : past, present ,future
MiroslavDobsicek :Modern Steagnography
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
