CFP last date
20 May 2024
Reseach Article

An Inductive Approach to the Knack of Steganology

by Remya A R, A Sreekumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 15
Year of Publication: 2013
Authors: Remya A R, A Sreekumar
10.5120/12573-9200

Remya A R, A Sreekumar . An Inductive Approach to the Knack of Steganology. International Journal of Computer Applications. 72, 15 ( June 2013), 27-31. DOI=10.5120/12573-9200

@article{ 10.5120/12573-9200,
author = { Remya A R, A Sreekumar },
title = { An Inductive Approach to the Knack of Steganology },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 15 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number15/12573-9200/ },
doi = { 10.5120/12573-9200 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:38:02.320270+05:30
%A Remya A R
%A A Sreekumar
%T An Inductive Approach to the Knack of Steganology
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 15
%P 27-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganology, the knack of unseen communication has a significant pose in the modern digital era. Steganography, the practice of concealing a message in any digital medium to the extent that it is not even revealed that a hidden communication is happening through. Steganalysis, the practice to listen the communication medium that results in detection of the presence of any hidden communication. This paper presents a brief overview in the field of Steganology, especially steganography.

References
  1. Stefan Katzenbeisser and Fabien A. P. Petitcolas , "Information Hiding Techniques for Steganography and Digital Watermarking", Computer Security Series, Artech House, Boston, 2000
  2. K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report, 2004
  3. M. K. Kaleem, "An Overview of various forms of Linguistic Steganography and their Applications in protecting data", Journal of Global Research in Computer Science, Volume 3, No. 5, May 2012
  4. Cerkez Paul S , "Automated Detection of Semagram-Laden Images", Graduate School of Computer and Information Sciences, Nova Southeastern University, 2012
  5. Gustavus J. Simmons , "The prisoner's problem and the subliminal channel", Sandia National Laboratories, Albuquerque, NM 87185
  6. B. Schneier, "Secrets & Lies; Digital Security in a Networked World", John Wiley & Sons, 2000
  7. "Eliminating Steganography in Internet Traf?c with Active Wardens" Gina Fisk, Mike Fisk, Christos Papadopoulos and Josh Neil, Los Alamos National Laboratory and University of Southern California
  8. Ronald L. Rivest , "Chaffing and Winnowing: Confidentiality without Encryption", CryptoBytes Summer 1998 – The Technical News Letter of RSA Laboratories
  9. Amitabh Maurya, Pankaj Kumar Saini and Navnish Goel, "Chaffing and winnowing without using steganography and encryption technique", International Journal of Information Technology and Knowledge Management, July-December 2011, Volume 4, No. 2, pp. 515-517
  10. Peter Wayner, "Mimic Function and Tractability", Presented By: Quanzhong Li, November 8, 1999
  11. Scott Craver , "On Public-key Steganography in the Presence of an Active Warden", Intel Corporation, Microcomputer Research Labs, 2200 Mission College Blvd. , Santa Clara, CA 95052-8119; Department of Mathematical Sciences, Northern Illinois University, DeKalb, IL 60115
  12. Neil F. Johnson and Sushil Jajodia , "Steganalysis: The Investigation of Hidden Information", 1998 IEEE Information Technology Conference Information Environment for the Future Cat No98EX228 (1998)
  13. Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett , "Steganography And Digital Watermarking", School of Computer Science, The University of Birmingham
  14. Zaidoon Kh. AL-Ani, A. A. Zaidan, B. B. Zaidan and Hamdan. O. Alanazi , "Overview: Main Fundamentals for Steganography", Journal Of Computing, Volume 2, Issue 3, March 2010, Issn 2151-9617
  15. Luis von Ahn and Nicholas J. Hopper, "Public-Key Steganography", Computer Science Dept, Carnegie Mellon University, Pittsburgh PA 15213 USA
  16. Mehdi Kharrazi1, Husrev T. Sencar, and Nasir Memon , "Image Steganography: Concepts and Practice", WSPC/Lecture Notes Series: 9in x 6in, April 22, 2004
  17. Kaliappan Gopalan and Stanley Wenndt , "Audio steganography for covert data transmission by imperceptible tone insertion", Department of Engineering, Purdue University Calumet, Hammond, IN 46323 ; Multi-Sensor Exploitation Branch, AFRL/IFEC, Rome, NY 13441
  18. Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim , "Text Steganography: A Novel Approach", International Journal of Advanced Science and Technology, Vol. 3, February, 2009
  19. Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere , "Covert Communication through Executables", Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000 Gent, Belgium
  20. Ravindra Gupta, Akanksha Jain, Gajendra Singh, "Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics", International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4366 - 4370
  21. Jasvinder Kaur,Manoj Duhan,Ashok Kumar,Raj Kumar Yadav , "Matrix Matching Method For Secret Communication Using Image Steganography", ANNALS OF FACULTY ENGINEERINGHUNEDOARA– InternationalJournalOf Engineering, 2012
  22. Jasvinder Kaur, Manoj Duhan,Ashok Kumar , "Digital Logic Embedding Using Single Row", International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 12 December 2011
  23. Jessica Fridrich and Miroslav Goljan , "Digital image steganography using stochastic modulation", Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY, 13902-6000, USA
  24. Dr. Natarajan Meghanathan, "Least Significant Bit (LSB)-based Steganography"
  25. Charles Kurak And John Mc Huges , "A Cautionary Note On Image Downgrading", IEEE 1992
  26. Jiri Fridrich & Du Rui , "Secure Steganographic Methods for Palette Images", Information Hiding Lecture Notes in Computer Science Volume 1768, 2000, pp 47-60
  27. J. M. Buhmann, D. W. Fellner, M. Held,J. Kettererand J. Puzicha, "Dithered Color Quantization", Wiley Online Library, Computer Graphics Forum, Volume 17, Issue 3, Article first published online: 25 DEC 2001
  28. Jiri Fridrich, "A New Steganographic Method for Palette-Based Images", in Proceedings of the IS&T PICS conference, 1999
  29. Xuefeng Wang, Zhen Yao & Chang-Tsun Li , "A Palette-Based Image Steganographic Method Using Colour Quantisation", IEEE 2005
  30. Abdelrahman Desok , "Noiseless Steganography: The Key to Covert Communications", CRC Press
  31. Ekta Walia,Payal Jain and Navdeep, " An Analysis of LSB & DCT based Steganography", Global Journal of Computer Science and Technology, P a g e | 4 Vol. 10 Issue 1 (Ver 1. 0), April 2010
  32. Ken Cabeen and Peter Gent , "Image Compression and Discrete Cosine Transform"
  33. Matthew Warren Dodd , "Applications of the Discrete Fourier Transform in Information Theory and Cryptology", PhD Thesis, Royal Holloway and Bedford New College, University of London
  34. James L. Massey, "The Discrete Fourier Transform in Coding and Cryptography", ITW 1998, San Diego, CA, February 8 – 11
  35. Robert T. McKeon, Member, Steganography using the Fourier Transform and Zero-Padding Aliasing Properties (May 2006), IEEE
  36. Po-Yueh Chen and Hung-Ju Lin , "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering, 2006. 4, 3: 275-290
  37. Frederick S. Brundick and Lisa M. Marvel, "Implementation of Spread Spectrum Image Steganography", ARMY Research Laboratory, March 2001
  38. Luis Perez-Freire, Pierre Moulin and Fernando Perez-Gonzalez, "Security of spread-spectrum-based data hiding", SPIE Proceedings Vol. 6505, February 2007
  39. Sharon Rose Govada, Bonu Satish Kumar, "Text Steganography with Multi level Shielding", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
  40. Dr. Natarajan Meghanathan, "Information Hiding through Cover Generation: Using Context-Free Grammar"
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Steganalysis Cover Medium Stego Object Stego Medium