Research Article

Analysis and Refinement of Steganography Techniques

by  Tamanna, Ashwani Sethi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Issue 8
Published: Jul 2017
Authors: Tamanna, Ashwani Sethi
10.5120/ijca2017914922
PDF

Tamanna, Ashwani Sethi . Analysis and Refinement of Steganography Techniques. International Journal of Computer Applications. 170, 8 (Jul 2017), 9-13. DOI=10.5120/ijca2017914922

                        @article{ 10.5120/ijca2017914922,
                        author  = { Tamanna,Ashwani Sethi },
                        title   = { Analysis and Refinement of Steganography Techniques },
                        journal = { International Journal of Computer Applications },
                        year    = { 2017 },
                        volume  = { 170 },
                        number  = { 8 },
                        pages   = { 9-13 },
                        doi     = { 10.5120/ijca2017914922 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2017
                        %A Tamanna
                        %A Ashwani Sethi
                        %T Analysis and Refinement of Steganography Techniques%T 
                        %J International Journal of Computer Applications
                        %V 170
                        %N 8
                        %P 9-13
                        %R 10.5120/ijca2017914922
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is an art and technique of hiding data in some media i.e image, audio or video file. For hiding data various steganography techniques are used. This paper is an effort to provide comprehensive comparison of these steganography techniques based on different performance metrics such as PSNR, MSE and Embedding capacity. [16] The embedding capacity of Jpeg-Steganography is very less than spatial domain techniques. The spatial domain techniques provide high PSNR, high perceptual quality and high embedding capacity but these not provide robustness. On the other hand transform domain provide robustness while providing very less embedding capacity, low PSNR and low perceptual quality.

References
  • Sanjiv Manchanda, Mayank dave and S. B. Singh, “Customized and secure Image Steganography Through random Numbers Logic”. In Signal Processing: An International Journal, Volume 1: Issue (1)-2007
  • Dipesh Agrawal, Samidha diwedi Sharma, “Analysis of Random Bit Image Steganography techniques”. An International Conference on recent trends in engineering & Technology-2013.\
  • Jayeeta Majumder, Sweta Mangal, “An Overview of Image Steganography Using LSB Technique”. National Conference on advance in Computer science-2012
  • Mamta Juneja, Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”. An International Conference on Advances in Recent Technologies in Communication and Computing-2009
  • Anil Kumar, Rohini Sharma, “A Secure Image Steganography Based on RSA Algorithm and HASH-LSB Technique”. An International of Advance Research in Computer Science and Software Engineering-2013
  • Mamta Juneja, Parvinder Singh Sandhu, “Improved LSB based Steganography Techniques for Color Images in Spatial Domain”. An International Journal of Network security-2014
  • Stuti Goel, Arun Rana, Manpreet Kaur, “A Review of Comparison Techniques of Image Steganography”. Global Journal of Computer Science and technology graphic & Vision (USA)-2013
  • Vikas Tyagi, Atul Kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar, “Image Steganography Using Least Significant Bit with Cryptography”. Journal of Global Research in Computer science-2012
  • Wallace, G. K. , “The JPEG Still Picture Compression Standard”, Communications of the ACM, vol. 34, no. 4, 1991
  • Cox, “A Secure, Robust watermark for Multimedia,” in Information Hiding: First International Workshop, Proceedings,Springer-1996
  • Xia, X, C. G. Boncelet, and G.r. Arce, “A Meltiresoltuion Watermark for Digital Images,” in proceedings of the IEEE International Conference on Image Processing-1997
  • Sandford, N. bardley and T. G. Handel, “Data Embedding Method,” in Proceddings of the SPIE-1996
  • J.J Chae and B. S. Manjunath, “A Robust embedded Data from Wavelet Coefficients”, SPIE-1998
  • J.R. Harnandez, M. amado and F. PerezGonzalez, “DCT-Domain watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE-2000
  • J.J. eggers, R. Bauml and B. Girod, “A Communications approach to image steganography” SPIE-2002.
  • Sangeeta Dhall, Bharat Bhushan and Shailender ,“An In-depth Analysis of various Steganography Techniques”
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Steganography Frequency Domain Spatial domain LSB method PSNR MSE

Powered by PhDFocusTM