CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis

Published on April 2014 by Pooja Rawat, Amit Kumar Pandey, Shiv Pratap Singh Kushwah
National Seminar on Recent Advances in Wireless Networks and Communications
Foundation of Computer Science USA
NWNC - Number 3
April 2014
Authors: Pooja Rawat, Amit Kumar Pandey, Shiv Pratap Singh Kushwah
ac0f8890-fa35-4b34-ad75-b3e64e6f4a2e

Pooja Rawat, Amit Kumar Pandey, Shiv Pratap Singh Kushwah . Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis. National Seminar on Recent Advances in Wireless Networks and Communications. NWNC, 3 (April 2014), 31-35.

@article{
author = { Pooja Rawat, Amit Kumar Pandey, Shiv Pratap Singh Kushwah },
title = { Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis },
journal = { National Seminar on Recent Advances in Wireless Networks and Communications },
issue_date = { April 2014 },
volume = { NWNC },
number = { 3 },
month = { April },
year = { 2014 },
issn = 0975-8887,
pages = { 31-35 },
numpages = 5,
url = { /proceedings/nwnc/number3/16128-1439/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Seminar on Recent Advances in Wireless Networks and Communications
%A Pooja Rawat
%A Amit Kumar Pandey
%A Shiv Pratap Singh Kushwah
%T Advanced Image Steganographic Algorithms and Breaking Strategies: an Analysis
%J National Seminar on Recent Advances in Wireless Networks and Communications
%@ 0975-8887
%V NWNC
%N 3
%P 31-35
%D 2014
%I International Journal of Computer Applications
Abstract

We all are familiar about Steganography. We know that Steganography is a skill of hiding any information with invisible existence inside other objects, which are known as cover objects. These cover objects can be protocol, audio, video, text, image etc. Today HTML pages and spam emails are also being used for Steganography. With the help of Steganography we can hide the information which is paramount and confidential for us. In comparison to the bulk of papers that examines either Steganography or Steganalysis techniques; this paper gives deeply description of both image Steganography breaking strategies of them. It also discusses that which image format is most appropriate or best for our algorithm and how can we perform compression on that. The paper can therefore be divided into many parts and all parts of this paper will be very beneficial for readers'.

References
  1. T Morkel, J. H. P Eloff, M. S Olivier, "an overview of image Steganography". Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), 2005.
  2. Krenn, R. , "Steganography and Steganalysis", http://www. krenn. nl/univ/cry/steg/article. pdf
  3. Paula Aguilera, "Comparison of different image compression formats". ECE 533 Project Report.
  4. Pao-Yen Lin, "Basic Image Compression Algorithm and Introduction to JPEG Standard".
  5. Wei-Yi Wei, "An Introduction to Image Compression.
  6. V. Lokeshwara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats". Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872(2011).
  7. Philip Bateman, Dr. Hans Georg Schaathun, "Image Steganography and Steganalysis". University of Surrey, Department of Computing.
  8. Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt , "Enhancing Steganography in Digital Images". Canadian Conference on Computer and Robot Vision. 978-0-7695-3153-3/08. 2008 IEEE.
  9. Roy, Ratnakirti ; Changder, Suvamoy ; Sarkar, Anirban ;Debnath, Narayan C,"Evaluating Image Steganography techniques: future research challenges". Computing ,Management and Telecommunications (ComManTel), 2013 International Conference.
  10. Adnan Abdul-Aziz Gutub, "Pixel Indicator Technique for RGB Image Steganography". Journal of emerging technologies in web intelligence, Volume 2, no. 1, February 2010.
  11. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen, Aleem Alvi, "Pixel Indicator High Capacity Technique For RGB Image Based Steganography".
  12. Tasnuva Mahjabin, Syed Monowar Hossain, Md. Shariful Haque, "A Block Based data Hiding Method in Images using Pixel Value Differencing and LSB Substitution Method". 978-1-4673-4836-2/12. IEEE 2012.
  13. Juan Jo? Roque, Jesús María Minguet, "SLSB: Improving the Steganographic Algorithm LSB".
  14. Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung, "Image Steganography and Steganalysis: A Survey". International Journal of Computer Applications (0975-8887). Volume 52- No. 2, August 2012.
  15. Medha Kulkarni, Dr. J. W. Bakal, "Hide and Seek in JPEG Images" . International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 4, July-August 2012, pp. 1634-163
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Jpeg Vs Other Formats Image Compression.