CFP last date
22 April 2024
Reseach Article

A Survey on Novel Visual Cryptographic Steganography Techniques

Published on December 2014 by Shailendra M. Pardeshi, Bharti D. Patil, Vipul D. Punjabi
National Conference on Emerging Trends in Information Technology
Foundation of Computer Science USA
NCETIT - Number 2
December 2014
Authors: Shailendra M. Pardeshi, Bharti D. Patil, Vipul D. Punjabi
d1c66923-587a-4ad6-b814-ca23292ad6ec

Shailendra M. Pardeshi, Bharti D. Patil, Vipul D. Punjabi . A Survey on Novel Visual Cryptographic Steganography Techniques. National Conference on Emerging Trends in Information Technology. NCETIT, 2 (December 2014), 16-19.

@article{
author = { Shailendra M. Pardeshi, Bharti D. Patil, Vipul D. Punjabi },
title = { A Survey on Novel Visual Cryptographic Steganography Techniques },
journal = { National Conference on Emerging Trends in Information Technology },
issue_date = { December 2014 },
volume = { NCETIT },
number = { 2 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/ncetit/number2/19073-3022/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Information Technology
%A Shailendra M. Pardeshi
%A Bharti D. Patil
%A Vipul D. Punjabi
%T A Survey on Novel Visual Cryptographic Steganography Techniques
%J National Conference on Emerging Trends in Information Technology
%@ 0975-8887
%V NCETIT
%N 2
%P 16-19
%D 2014
%I International Journal of Computer Applications
Abstract

The steganography and cryptography are the secret writing techniques. Steganography hides the existence of message by embedding data in some other digital media like image or audio format and Cryptography converts data in to cipher text that can be in unreadable format to normal user. This paper can concentrate to make review of combine data hiding techniques useable for security of data. This paper can defines RSA algorithm for encryption and embedded encrypted data in an image using DCT based steganographic technique. The DCT based technique is better than the other techniques like LSB, Modulus arithmetic steganography.

References
  1. Fridrich, J. , Goljan, M. and Du,R, Reliable Detection of LSB Steganography in Color and Grayscale Images, Proceedings of ACM Workshop on Multimedia and Security, Ottawa, October 5, 2001, pp. 27-30.
  2. Sathiamoorthy Manoharan, an empirical analysis of rs steganalysis, proceedings of the third international conference on internet monitoring and protection, ieee computer society washington, 2008.
  3. Rita Srita Rana, Dheerendra Singh, Steganography-Concealing Messages in Images Using LSB Replacement Technique with Pre-Determined Random Pixel and Segmentation of Image, International Journal of Computer Science & CommunicationVol. 1, No. 2, July-December 2010, pp. 113-116.
  4. Singh Komal, K. M. ; Nandi, S. ; Birendra Singh, S. ; ShyamSundar Singh, L. ; , Stealth steganography in visual cryptography for half tone images, Computer and Communication Engineering, International Conference, 2008.
  5. Jithesh K , Dr. A V Senthil Kumar , Multi Layer Information Hiding - A Blend Of Steganography And Visual Cryptography, Journal of Theoritical and Applied Information Technology, 2010.
  6. R. Chandramouli, Nasir Menon, Analysis of LSB Based Image Steganography techniques, IEEE-2001.
  7. Neha Sharma, J. S. Bhatia and Dr. Neena Gupta, " An Encrypto-Stego Technique Based secure data Transmission System", PEC, Chandigarh.
  8. R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems". Communication of the ACM, pp. 120-126, 1978.
  9. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for Data Hiding", I. B. M. Systems Journal, 35(3-4): pp. 313-336, 1996.
  10. Hardik Patel, Preeti Dave / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 1,Jan-Feb 2012, pp. 713-717.
  11. T. Morkel, J. Eloff, and M. Olivier, "An overview of image steganography", In Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005).
  12. J. Fridrich, M. Goljan, " Steganalysis of JPEG Images: Breaking the F5 Algorithm", Publisher: Springer Berlin, Heidelberg, Lecture Notes.
  13. M. A. Bani Younes, A. Jantan, "A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion", IJCSNS, International Journal of Computer Science and Network Security, vol. 8 No. 6, June 2008.
  14. J. Rodrigues, J. Rios, and W. Puech "SSB-4 System of Steganography using bit 4", In International Workshop on Image Analysis for Multimedia WIAMIS, May, 2005.
  15. Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi, "Performance Improvement of JPEG2000 Steganography Using QIM", Department of System Design and Informatics, Journal of Communication and Computer, ISSN1548-7709, USA, Volume 6, No. 1(Serial No. 50), January 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cipher Text Cryptography Novel Rsa Algorithm Steganography.