![]() |
10.5120/730-1023 |
R Amirtharajan, Krishnendra Nathella and J Harish. Article:Info Hide A Cluster Cover Approach. International Journal of Computer Applications 3(5):11–18, June 2010. Published By Foundation of Computer Science. BibTeX
@article{key:article, author = {R. Amirtharajan and Krishnendra Nathella and J Harish}, title = {Article:Info Hide A Cluster Cover Approach}, journal = {International Journal of Computer Applications}, year = {2010}, volume = {3}, number = {5}, pages = {11--18}, month = {June}, note = {Published By Foundation of Computer Science} }
Abstract
In a highly digitalized world we live today, the data to be transmitted are confidential at times, and in such cases there are many malicious intruders who try to access this information. Steganography is one recent method to provide reliable security. Steganography is the science of embedding data into different covers such that the data embedded is imperceptible; the aim is to embed and deliver secret messages in digital objects without suspicion. The covers that can be used cover all forms of digital multimedia. This paper deals with “Multimedia Steganography” in the most common forms of multimedia- Image, Video and Audio.
Reference
-
Bender, W., Gruhl, D., Morimoto, N., Lu, A. Techniques for data hiding. IBM systems Journal (1996) 35 (3–4), 313–336.
Ching-Chiuan Lin∗, Nien-Lin Hsueh, lossless data hiding scheme based on three-pixel block differences.(2007),vol 81,581-595
Chung-Ming Wang., Nan-I Wu., Chwei-Shyong Tsai., Min-Shiang Hwang., A high quality steganographic method with pixel-value differencing and modulus function The Journal of Systems and Software (2008) 81, 150–158
Xinpeng Zhang , Shuozhong Wang.,Vulnerability of pixel-value differencing steganographyto histogram analysis and modification for enhanced security (2003) 331-339
Hideki Noda a, Michiharu Niimi a, Eiji Kawaguchi, High-performance JPEG steganography using quantization index modulation in DCT domain (2004) 455-461
A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in:Proceedings of the Third International Workshop on Information Hiding(2000) pp. 61–76.
J. Fridrich, M. Goljan, D. Hogea, New methodology for breaking steganographic techniques for JPEGs, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, (2003), pp. 143–155.
L.M. Marvel, C.G. Boncelet Jr., C.T. Retter, Spread spectrum image steganography, IEEE Trans. Image Process. 8 (8) (1999) 1075-1083.
S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000,97-98
F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
Gwena.el Do.err, Jean-Luc Dugelay. A guide tour of video watermarking” Signal Processing: Image Communication 18 (2003) 263–282.
Yousof Erfani , Shadi Siahpoush.,“Robust audio watermarking using improved TS echo hiding” ,Digital Signal Processing 19 (2009) 809–814.
Young-Shil Kim,Young-Mi Kim , Jin-Yong Choi, Doo-Kwon Baik ,2004, ” Information Hiding System Stegowavek For Improving Capacity” , Springer journal,(2004) 174-188
Chi-Kwong Chan, L.M. Cheng, “Hiding data in images by simple LSB substitution “, Pattern Recognition 37 (2004) 469 – 474.
Cheng-HsingYang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution” , Pattern Recognition 41 (2008) 2674 – 2683.
Po-Yueh Chen Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering (2006) 4, 3: 275-290.
