Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

Analysis and Refinement of Steganography Techniques

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Tamanna, Ashwani Sethi
10.5120/ijca2017914922

Tamanna and Ashwani Sethi. Analysis and Refinement of Steganography Techniques. International Journal of Computer Applications 170(8):9-13, July 2017. BibTeX

@article{10.5120/ijca2017914922,
	author = {Tamanna and Ashwani Sethi},
	title = {Analysis and Refinement of Steganography Techniques},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {170},
	number = {8},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {9-13},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume170/number8/28088-2017914922},
	doi = {10.5120/ijca2017914922},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Steganography is an art and technique of hiding data in some media i.e image, audio or video file. For hiding data various steganography techniques are used. This paper is an effort to provide comprehensive comparison of these steganography techniques based on different performance metrics such as PSNR, MSE and Embedding capacity. [16] The embedding capacity of Jpeg-Steganography is very less than spatial domain techniques. The spatial domain techniques provide high PSNR, high perceptual quality and high embedding capacity but these not provide robustness. On the other hand transform domain provide robustness while providing very less embedding capacity, low PSNR and low perceptual quality.

References

  1. Sanjiv Manchanda, Mayank dave and S. B. Singh, “Customized and secure Image Steganography Through random Numbers Logic”. In Signal Processing: An International Journal, Volume 1: Issue (1)-2007
  2. Dipesh Agrawal, Samidha diwedi Sharma, “Analysis of Random Bit Image Steganography techniques”. An International Conference on recent trends in engineering & Technology-2013.\
  3. Jayeeta Majumder, Sweta Mangal, “An Overview of Image Steganography Using LSB Technique”. National Conference on advance in Computer science-2012
  4. Mamta Juneja, Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”. An International Conference on Advances in Recent Technologies in Communication and Computing-2009
  5. Anil Kumar, Rohini Sharma, “A Secure Image Steganography Based on RSA Algorithm and HASH-LSB Technique”. An International of Advance Research in Computer Science and Software Engineering-2013
  6. Mamta Juneja, Parvinder Singh Sandhu, “Improved LSB based Steganography Techniques for Color Images in Spatial Domain”. An International Journal of Network security-2014
  7. Stuti Goel, Arun Rana, Manpreet Kaur, “A Review of Comparison Techniques of Image Steganography”. Global Journal of Computer Science and technology graphic & Vision (USA)-2013
  8. Vikas Tyagi, Atul Kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar, “Image Steganography Using Least Significant Bit with Cryptography”. Journal of Global Research in Computer science-2012
  9. Wallace, G. K. , “The JPEG Still Picture Compression Standard”, Communications of the ACM, vol. 34, no. 4, 1991
  10. Cox, “A Secure, Robust watermark for Multimedia,” in Information Hiding: First International Workshop, Proceedings,Springer-1996
  11. Xia, X, C. G. Boncelet, and G.r. Arce, “A Meltiresoltuion Watermark for Digital Images,” in proceedings of the IEEE International Conference on Image Processing-1997
  12. Sandford, N. bardley and T. G. Handel, “Data Embedding Method,” in Proceddings of the SPIE-1996
  13. J.J Chae and B. S. Manjunath, “A Robust embedded Data from Wavelet Coefficients”, SPIE-1998
  14. J.R. Harnandez, M. amado and F. PerezGonzalez, “DCT-Domain watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE-2000
  15. J.J. eggers, R. Bauml and B. Girod, “A Communications approach to image steganography” SPIE-2002.
  16. Sangeeta Dhall, Bharat Bhushan and Shailender ,“An In-depth Analysis of various Steganography Techniques”

Keywords

Steganography, Frequency Domain, Spatial domain, LSB method, PSNR, MSE