Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 14
Year of Publication: 2014
Anuj Kumar
Shivani Khurana

Anuj Kumar and Shivani Khurana. Article: Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack. International Journal of Computer Applications 90(14):33-36, March 2014. Full text available. BibTeX

	author = {Anuj Kumar and Shivani Khurana},
	title = {Article: Steganalysis Technique on Gray Scale Image by Varying Message Length using Adaptive Histogram Equalization Attack},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {14},
	pages = {33-36},
	month = {March},
	note = {Full text available}


Steganography considered as a technique for secret communication without knowing the others and only an authorized user can access the information which is embedding in the cover medium. Steganalysis is the process to detect of presence of Steganography and to destroy, extract it. In this Paper There is Adaptive Histogram Equalization Technique that performed on the Stego Image that is category of the Histogram Equalization attack and measuring the quality of Image after applying the Attack.


  • Atallah M. Al-Shatnawi(2012) "A New Method in Image Steganography with Improved Image Quality. " Al-albayt University, Vol. 6, 2012, no. 79, 3907 - 3915. http://www. m-hikari. com/ams/ams-2012/ams-77-80-2012/alshatnawiAMS77-80-2012. pdf
  • Ankita Agarwal(2012)" Security Enhancement Scheme for Image Steganography using S-DES Technique ". International Journal of Advanced Research in Computer Science and Software Engineering , April 2012/volume 2 issue 4/V2I400162. http://www. ijarcsse. com/docs/papers/April2012/Volume_2_issue_4/V2I400162. pdf
  • Nazanin Zaker , Ali Hamzeh(2011)"A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram"Shiraz University, 25 january 2011. http://connection. ebscohost. com/c/articles/73762949/novel-steganalysis-tpvd-steganographic-method-based-differences-pixel-difference-histogram
  • Arpan Ghorai, Dibyendu Chowdhury, Satyajit Das(2011)," Design and Implementation of Public Key Steganography," International Journal of Soft Computing and Engineering (IJSCE) http://digitalcommons. unl. edu/cgi/viewcontent. cgi?article=1095&context=computerelectronicfacpub&sei
  • Dr. N. Meghanathan, " Least Significant Based (LSB) Steganography ,''Jackson State University. http://www. jsums. edu/cms/tues/docs/Steganography/LSB-Steganography. pdf
  • "Peak signal to noise ratio". http://en. wikipedia. org/wiki/Peak_signal-to-noise_ratio
  • V. Sharma, S. kumar, "A New Approach to Hide Text in Images Using Steganography"ijarcsse, 4 april 2013, V3I40401 volume 3. http://www. ijarcsse. com/docs/papers/Volume_3/4_April2013/V3I4-0401. pdf
  • A. Kumar and Km. Pooja, "Steganography : A Data Hiding technique," International journal of computer Application(0975-8887),vol-9 no. 7,november 2010. http://citeseerx. ist. psu. edu/viewdoc/download?rep=rep1&type=pdf&doi=10. 1. 1. 206. 5754
  • Kevin O'Bryant, "Principle of steganography". http://www. math. ucsd. edu/~crypto/Projects/MaxWeiss/steganography. pdf
  • Introduction to Stegnography. http://io. acad. athabascau. ca/~grizzlie/Comp607/menu. htm