Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

A Survey on Novel Visual Cryptographic Steganography Techniques

Print
PDF
IJCA Proceedings on National Conference on Emerging Trends in Information Technology
© 2014 by IJCA Journal
NCETIT - Number 2
Year of Publication: 2014
Authors:
Shailendra M. Pardeshi
Bharti D. Patil
Vipul D. Punjabi

Shailendra M Pardeshi, Bharti D Patil and Vipul D Punjabi. Article: A Survey on Novel Visual Cryptographic Steganography Techniques. IJCA Proceedings on National Conference on Emerging Trends in Information Technology NCETIT(2):16-19, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Shailendra M. Pardeshi and Bharti D. Patil and Vipul D. Punjabi},
	title = {Article: A Survey on Novel Visual Cryptographic Steganography Techniques},
	journal = {IJCA Proceedings on National Conference on Emerging Trends in Information Technology},
	year = {2014},
	volume = {NCETIT},
	number = {2},
	pages = {16-19},
	month = {December},
	note = {Full text available}
}

Abstract

The steganography and cryptography are the secret writing techniques. Steganography hides the existence of message by embedding data in some other digital media like image or audio format and Cryptography converts data in to cipher text that can be in unreadable format to normal user. This paper can concentrate to make review of combine data hiding techniques useable for security of data. This paper can defines RSA algorithm for encryption and embedded encrypted data in an image using DCT based steganographic technique. The DCT based technique is better than the other techniques like LSB, Modulus arithmetic steganography.

References

  • Fridrich, J. , Goljan, M. and Du,R, Reliable Detection of LSB Steganography in Color and Grayscale Images, Proceedings of ACM Workshop on Multimedia and Security, Ottawa, October 5, 2001, pp. 27-30.
  • Sathiamoorthy Manoharan, an empirical analysis of rs steganalysis, proceedings of the third international conference on internet monitoring and protection, ieee computer society washington, 2008.
  • Rita Srita Rana, Dheerendra Singh, Steganography-Concealing Messages in Images Using LSB Replacement Technique with Pre-Determined Random Pixel and Segmentation of Image, International Journal of Computer Science & CommunicationVol. 1, No. 2, July-December 2010, pp. 113-116.
  • Singh Komal, K. M. ; Nandi, S. ; Birendra Singh, S. ; ShyamSundar Singh, L. ; , Stealth steganography in visual cryptography for half tone images, Computer and Communication Engineering, International Conference, 2008.
  • Jithesh K , Dr. A V Senthil Kumar , Multi Layer Information Hiding - A Blend Of Steganography And Visual Cryptography, Journal of Theoritical and Applied Information Technology, 2010.
  • R. Chandramouli, Nasir Menon, Analysis of LSB Based Image Steganography techniques, IEEE-2001.
  • Neha Sharma, J. S. Bhatia and Dr. Neena Gupta, " An Encrypto-Stego Technique Based secure data Transmission System", PEC, Chandigarh.
  • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems". Communication of the ACM, pp. 120-126, 1978.
  • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for Data Hiding", I. B. M. Systems Journal, 35(3-4): pp. 313-336, 1996.
  • Hardik Patel, Preeti Dave / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 1,Jan-Feb 2012, pp. 713-717.
  • T. Morkel, J. Eloff, and M. Olivier, "An overview of image steganography", In Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005).
  • J. Fridrich, M. Goljan, " Steganalysis of JPEG Images: Breaking the F5 Algorithm", Publisher: Springer Berlin, Heidelberg, Lecture Notes.
  • M. A. Bani Younes, A. Jantan, "A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion", IJCSNS, International Journal of Computer Science and Network Security, vol. 8 No. 6, June 2008.
  • J. Rodrigues, J. Rios, and W. Puech "SSB-4 System of Steganography using bit 4", In International Workshop on Image Analysis for Multimedia WIAMIS, May, 2005.
  • Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi, "Performance Improvement of JPEG2000 Steganography Using QIM", Department of System Design and Informatics, Journal of Communication and Computer, ISSN1548-7709, USA, Volume 6, No. 1(Serial No. 50), January 2009.