CFP last date
20 May 2024
Reseach Article

Steganography: A Juxtaposition between LSB DCT, DWT

by Tamanna, Ashwani Sethi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 11
Year of Publication: 2015
Authors: Tamanna, Ashwani Sethi
10.5120/ijca2015906215

Tamanna, Ashwani Sethi . Steganography: A Juxtaposition between LSB DCT, DWT. International Journal of Computer Applications. 126, 11 ( September 2015), 6-10. DOI=10.5120/ijca2015906215

@article{ 10.5120/ijca2015906215,
author = { Tamanna, Ashwani Sethi },
title = { Steganography: A Juxtaposition between LSB DCT, DWT },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 11 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number11/22594-2015906215/ },
doi = { 10.5120/ijca2015906215 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:17:09.749406+05:30
%A Tamanna
%A Ashwani Sethi
%T Steganography: A Juxtaposition between LSB DCT, DWT
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 11
%P 6-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the technique to concealing information to the extent which nobody, except for the transmitter and also the designated receiver, anticipate the presence of the hidden data. Steganography is the craft to concealing important information in such a way that restrict recognition. The Steganography utilized towards transportation important information from just one destination to some other location by using general public network as part of stealth way. Steganography hides the extremely existence of a information to ensure that if worthwhile that it usually appeals to no suspiciousness anyway. Steganography means that concealing a hidden information (the integrated message) inside a more substantial one (source cover) in such a way that an onlooker cannot identify the clear presence of contents of the hidden message [1]. A lot of different service provider file formats can be made use of, however digital images are the most prominent because of the consistency on the Internet. For hiding mysterious important facts in images, there exists a spacious assortment of Steganography strategies some are much more complicated as opposed to others and every one of them have respective robust as well as weak spots. Different programs have actually different specifications for the Steganography approach used. This Particular document promises to provide an introduction to image Steganography, its makes use of as well as strategies. It also initiatives to determine the prerequisites of a good Steganography algorithmic rule as well as quickly demonstrate upon which Steganography strategies tend to be more appropriate which applications.

References
  1. Deshpande Neeta, KamalapurSnehal, Daisy Jacobs, “Implementation of LSB Steganography and Its Evaluation for Various Bits”, 2004.
  2. K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, IEEE-0-7803-9588-3/05/$20.00 ©2005.
  3. Vijay KumarSharma, Vishalshrivastava, “A Steganography Algorithm for Hiding Images by improved LSB substitution by minize detection.”Journal of Theoretical and Applied Information Technology, Vol. 36 No.1, ISSN: 1992-8645, 15th February 2012.
  4. Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”,International Journal of Applied Science and Engineering 4, 3: 275-290, 2006.
  5. Chen Ming, Zhang Ru, NiuXinxin, Yang Yixian, “Analysis of Current Steganography Tools: Classifications & Features” , International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'06),IEEE- 0-7695-2745-0/06 $20.00 © 2006.
  6. Aneesh Jain, Indranil Sen. Gupta, “A JPEG Compression Resistant Steganography Scheme for Raster Graphics Images”,IEEE-1-4244-1272-2/07/$25.00©2007.
  7. Beenish Mehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427-6/08/$20.00©2008.
  8. Hassan Mathkour, Batool Al-Sadoon, Ameur Touir, “A New Image Steganography Technique”, IEEE-978-1-4244-2108-4/08/$25.00 © 2008.
  9. NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications, No.3 (17), 2008.
  10. Mamta Juneja, Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”, International Conference on Advances in Recent Technologies in Communication and Computing, 2009.
  11. Dr. EktaWalia, Payal Jain, Navdeep, “An Analysis of LSB & DCT based Steganography”, Global Journal of Computer science & technology, Vol. 10 Issue 1 (Ver 1.0), April 2010.
  12. K.B. Shiva Kumar, K.B. Raja, R.K. Chhotaray, Sabyasachi Pattnaik, “Coherent Steganography using Segmentation and DCT”, IEEE-978-1-4244-5967-4/10/$26.00 ©2010.
  13. K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, L M Patnaik, “Authentication of Secret Information in Image Steganography” .
  14. Arvind Kumar, Km. Pooja, “Steganography- A Data Hiding Technique”, International Journal of Computer Applications (0975 – 8887), Volume 9– No.7, November 2010.
  15. Atalla I. Hashad, Ahmed S. Madani, “A Robust Steganography Technique Using Discrete Cosine Transform Insertion”.
  16. H. C. Wu, N.I. Wu, C.S. Tsai,and M.S Hwang “Image Steganography scheme based on pixel-value differencing and LSB replacement methods”, IEEE Proceedings Vision, Image and Signal Processing, vol.152, no.5, pp.611-615, 2005.
  17. X. Wang, “A palette-based image steganographic method using color quantization”, in Proceedings of IEEE International Conferenceon Image Processing, vol.2, 2005, pp.1090-1093.
  18. K. Satish, T. Jayakar, C. Tobin, K. Madhavi, and K. Murali, “Chaos based spread spectrum image Steganography”, IEEE Transactions on Consumer Electronics, vol.50, no.2, pp.587-590, 2004
  19. R. J. Anderson, and F. A. P. Petitcolas, “On the limits of Steganography”, IEEE Journal of Selected Areas in Communications,vol.16, no.4, pp.474-481, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Frequency Domain Spatial domain LSB method