Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Analysis and Refinement of Steganography Techniques

by Tamanna, Ashwani Sethi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Number 8
Year of Publication: 2017
Authors: Tamanna, Ashwani Sethi
10.5120/ijca2017914922

Tamanna, Ashwani Sethi . Analysis and Refinement of Steganography Techniques. International Journal of Computer Applications. 170, 8 ( Jul 2017), 9-13. DOI=10.5120/ijca2017914922

@article{ 10.5120/ijca2017914922,
author = { Tamanna, Ashwani Sethi },
title = { Analysis and Refinement of Steganography Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 170 },
number = { 8 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume170/number8/28088-2017914922/ },
doi = { 10.5120/ijca2017914922 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:17:55.045220+05:30
%A Tamanna
%A Ashwani Sethi
%T Analysis and Refinement of Steganography Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 170
%N 8
%P 9-13
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is an art and technique of hiding data in some media i.e image, audio or video file. For hiding data various steganography techniques are used. This paper is an effort to provide comprehensive comparison of these steganography techniques based on different performance metrics such as PSNR, MSE and Embedding capacity. [16] The embedding capacity of Jpeg-Steganography is very less than spatial domain techniques. The spatial domain techniques provide high PSNR, high perceptual quality and high embedding capacity but these not provide robustness. On the other hand transform domain provide robustness while providing very less embedding capacity, low PSNR and low perceptual quality.

References
  1. Sanjiv Manchanda, Mayank dave and S. B. Singh, “Customized and secure Image Steganography Through random Numbers Logic”. In Signal Processing: An International Journal, Volume 1: Issue (1)-2007
  2. Dipesh Agrawal, Samidha diwedi Sharma, “Analysis of Random Bit Image Steganography techniques”. An International Conference on recent trends in engineering & Technology-2013.\
  3. Jayeeta Majumder, Sweta Mangal, “An Overview of Image Steganography Using LSB Technique”. National Conference on advance in Computer science-2012
  4. Mamta Juneja, Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”. An International Conference on Advances in Recent Technologies in Communication and Computing-2009
  5. Anil Kumar, Rohini Sharma, “A Secure Image Steganography Based on RSA Algorithm and HASH-LSB Technique”. An International of Advance Research in Computer Science and Software Engineering-2013
  6. Mamta Juneja, Parvinder Singh Sandhu, “Improved LSB based Steganography Techniques for Color Images in Spatial Domain”. An International Journal of Network security-2014
  7. Stuti Goel, Arun Rana, Manpreet Kaur, “A Review of Comparison Techniques of Image Steganography”. Global Journal of Computer Science and technology graphic & Vision (USA)-2013
  8. Vikas Tyagi, Atul Kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar, “Image Steganography Using Least Significant Bit with Cryptography”. Journal of Global Research in Computer science-2012
  9. Wallace, G. K. , “The JPEG Still Picture Compression Standard”, Communications of the ACM, vol. 34, no. 4, 1991
  10. Cox, “A Secure, Robust watermark for Multimedia,” in Information Hiding: First International Workshop, Proceedings,Springer-1996
  11. Xia, X, C. G. Boncelet, and G.r. Arce, “A Meltiresoltuion Watermark for Digital Images,” in proceedings of the IEEE International Conference on Image Processing-1997
  12. Sandford, N. bardley and T. G. Handel, “Data Embedding Method,” in Proceddings of the SPIE-1996
  13. J.J Chae and B. S. Manjunath, “A Robust embedded Data from Wavelet Coefficients”, SPIE-1998
  14. J.R. Harnandez, M. amado and F. PerezGonzalez, “DCT-Domain watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE-2000
  15. J.J. eggers, R. Bauml and B. Girod, “A Communications approach to image steganography” SPIE-2002.
  16. Sangeeta Dhall, Bharat Bhushan and Shailender ,“An In-depth Analysis of various Steganography Techniques”
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Frequency Domain Spatial domain LSB method PSNR MSE