Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Info Hide – A Cluster Cover Approach

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 5 - Article 3
Year of Publication: 2010
Authors:
R. Amirtharajan
Krishnendra Nathella
J Harish
10.5120/730-1023

R Amirtharajan, Krishnendra Nathella and J Harish. Article:Info Hide A Cluster Cover Approach. International Journal of Computer Applications 3(5):11–18, June 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {R. Amirtharajan and Krishnendra Nathella and J Harish},
	title = {Article:Info Hide  A Cluster Cover Approach},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {3},
	number = {5},
	pages = {11--18},
	month = {June},
	note = {Published By Foundation of Computer Science}
}

Abstract

In a highly digitalized world we live today, the data to be transmitted are confidential at times, and in such cases there are many malicious intruders who try to access this information. Steganography is one recent method to provide reliable security. Steganography is the science of embedding data into different covers such that the data embedded is imperceptible; the aim is to embed and deliver secret messages in digital objects without suspicion. The covers that can be used cover all forms of digital multimedia. This paper deals with “Multimedia Steganography” in the most common forms of multimedia- Image, Video and Audio.

Reference

  • Bender, W., Gruhl, D., Morimoto, N., Lu, A. Techniques for data hiding. IBM systems Journal (1996) 35 (3–4), 313–336.
  • Ching-Chiuan Lin∗, Nien-Lin Hsueh, lossless data hiding scheme based on three-pixel block differences.(2007),vol 81,581-595
  • Chung-Ming Wang., Nan-I Wu., Chwei-Shyong Tsai., Min-Shiang Hwang., A high quality steganographic method with pixel-value differencing and modulus function The Journal of Systems and Software (2008) 81, 150–158
  • Xinpeng Zhang , Shuozhong Wang.,Vulnerability of pixel-value differencing steganographyto histogram analysis and modification for enhanced security (2003) 331-339
  • Hideki Noda a, Michiharu Niimi a, Eiji Kawaguchi, High-performance JPEG steganography using quantization index modulation in DCT domain (2004) 455-461
  • A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in:Proceedings of the Third International Workshop on Information Hiding(2000) pp. 61–76.
  • J. Fridrich, M. Goljan, D. Hogea, New methodology for breaking steganographic techniques for JPEGs, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, (2003), pp. 143–155.
  • L.M. Marvel, C.G. Boncelet Jr., C.T. Retter, Spread spectrum image steganography, IEEE Trans. Image Process. 8 (8) (1999) 1075-1083.
  • S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000,97-98
  • F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
  • Gwena.el Do.err, Jean-Luc Dugelay. A guide tour of video watermarking” Signal Processing: Image Communication 18 (2003) 263–282.
  • Yousof Erfani , Shadi Siahpoush.,“Robust audio watermarking using improved TS echo hiding” ,Digital Signal Processing 19 (2009) 809–814.
  • Young-Shil Kim,Young-Mi Kim , Jin-Yong Choi, Doo-Kwon Baik ,2004, ” Information Hiding System Stegowavek For Improving Capacity” , Springer journal,(2004) 174-188
  • Chi-Kwong Chan, L.M. Cheng, “Hiding data in images by simple LSB substitution “, Pattern Recognition 37 (2004) 469 – 474.
  • Cheng-HsingYang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution” , Pattern Recognition 41 (2008) 2674 – 2683.
  • Po-Yueh Chen Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering (2006) 4, 3: 275-290.