Research Article

An Inductive Approach to the Knack of Steganology

by  Remya A R, A Sreekumar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Issue 15
Published: June 2013
Authors: Remya A R, A Sreekumar
10.5120/12573-9200
PDF

Remya A R, A Sreekumar . An Inductive Approach to the Knack of Steganology. International Journal of Computer Applications. 72, 15 (June 2013), 27-31. DOI=10.5120/12573-9200

                        @article{ 10.5120/12573-9200,
                        author  = { Remya A R,A Sreekumar },
                        title   = { An Inductive Approach to the Knack of Steganology },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 72 },
                        number  = { 15 },
                        pages   = { 27-31 },
                        doi     = { 10.5120/12573-9200 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Remya A R
                        %A A Sreekumar
                        %T An Inductive Approach to the Knack of Steganology%T 
                        %J International Journal of Computer Applications
                        %V 72
                        %N 15
                        %P 27-31
                        %R 10.5120/12573-9200
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganology, the knack of unseen communication has a significant pose in the modern digital era. Steganography, the practice of concealing a message in any digital medium to the extent that it is not even revealed that a hidden communication is happening through. Steganalysis, the practice to listen the communication medium that results in detection of the presence of any hidden communication. This paper presents a brief overview in the field of Steganology, especially steganography.

References
  • Stefan Katzenbeisser and Fabien A. P. Petitcolas , "Information Hiding Techniques for Steganography and Digital Watermarking", Computer Security Series, Artech House, Boston, 2000
  • K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report, 2004
  • M. K. Kaleem, "An Overview of various forms of Linguistic Steganography and their Applications in protecting data", Journal of Global Research in Computer Science, Volume 3, No. 5, May 2012
  • Cerkez Paul S , "Automated Detection of Semagram-Laden Images", Graduate School of Computer and Information Sciences, Nova Southeastern University, 2012
  • Gustavus J. Simmons , "The prisoner's problem and the subliminal channel", Sandia National Laboratories, Albuquerque, NM 87185
  • B. Schneier, "Secrets & Lies; Digital Security in a Networked World", John Wiley & Sons, 2000
  • "Eliminating Steganography in Internet Traf?c with Active Wardens" Gina Fisk, Mike Fisk, Christos Papadopoulos and Josh Neil, Los Alamos National Laboratory and University of Southern California
  • Ronald L. Rivest , "Chaffing and Winnowing: Confidentiality without Encryption", CryptoBytes Summer 1998 – The Technical News Letter of RSA Laboratories
  • Amitabh Maurya, Pankaj Kumar Saini and Navnish Goel, "Chaffing and winnowing without using steganography and encryption technique", International Journal of Information Technology and Knowledge Management, July-December 2011, Volume 4, No. 2, pp. 515-517
  • Peter Wayner, "Mimic Function and Tractability", Presented By: Quanzhong Li, November 8, 1999
  • Scott Craver , "On Public-key Steganography in the Presence of an Active Warden", Intel Corporation, Microcomputer Research Labs, 2200 Mission College Blvd. , Santa Clara, CA 95052-8119; Department of Mathematical Sciences, Northern Illinois University, DeKalb, IL 60115
  • Neil F. Johnson and Sushil Jajodia , "Steganalysis: The Investigation of Hidden Information", 1998 IEEE Information Technology Conference Information Environment for the Future Cat No98EX228 (1998)
  • Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett , "Steganography And Digital Watermarking", School of Computer Science, The University of Birmingham
  • Zaidoon Kh. AL-Ani, A. A. Zaidan, B. B. Zaidan and Hamdan. O. Alanazi , "Overview: Main Fundamentals for Steganography", Journal Of Computing, Volume 2, Issue 3, March 2010, Issn 2151-9617
  • Luis von Ahn and Nicholas J. Hopper, "Public-Key Steganography", Computer Science Dept, Carnegie Mellon University, Pittsburgh PA 15213 USA
  • Mehdi Kharrazi1, Husrev T. Sencar, and Nasir Memon , "Image Steganography: Concepts and Practice", WSPC/Lecture Notes Series: 9in x 6in, April 22, 2004
  • Kaliappan Gopalan and Stanley Wenndt , "Audio steganography for covert data transmission by imperceptible tone insertion", Department of Engineering, Purdue University Calumet, Hammond, IN 46323 ; Multi-Sensor Exploitation Branch, AFRL/IFEC, Rome, NY 13441
  • Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim , "Text Steganography: A Novel Approach", International Journal of Advanced Science and Technology, Vol. 3, February, 2009
  • Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere , "Covert Communication through Executables", Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000 Gent, Belgium
  • Ravindra Gupta, Akanksha Jain, Gajendra Singh, "Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics", International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4366 - 4370
  • Jasvinder Kaur,Manoj Duhan,Ashok Kumar,Raj Kumar Yadav , "Matrix Matching Method For Secret Communication Using Image Steganography", ANNALS OF FACULTY ENGINEERINGHUNEDOARA– InternationalJournalOf Engineering, 2012
  • Jasvinder Kaur, Manoj Duhan,Ashok Kumar , "Digital Logic Embedding Using Single Row", International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 12 December 2011
  • Jessica Fridrich and Miroslav Goljan , "Digital image steganography using stochastic modulation", Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY, 13902-6000, USA
  • Dr. Natarajan Meghanathan, "Least Significant Bit (LSB)-based Steganography"
  • Charles Kurak And John Mc Huges , "A Cautionary Note On Image Downgrading", IEEE 1992
  • Jiri Fridrich & Du Rui , "Secure Steganographic Methods for Palette Images", Information Hiding Lecture Notes in Computer Science Volume 1768, 2000, pp 47-60
  • J. M. Buhmann, D. W. Fellner, M. Held,J. Kettererand J. Puzicha, "Dithered Color Quantization", Wiley Online Library, Computer Graphics Forum, Volume 17, Issue 3, Article first published online: 25 DEC 2001
  • Jiri Fridrich, "A New Steganographic Method for Palette-Based Images", in Proceedings of the IS&T PICS conference, 1999
  • Xuefeng Wang, Zhen Yao & Chang-Tsun Li , "A Palette-Based Image Steganographic Method Using Colour Quantisation", IEEE 2005
  • Abdelrahman Desok , "Noiseless Steganography: The Key to Covert Communications", CRC Press
  • Ekta Walia,Payal Jain and Navdeep, " An Analysis of LSB & DCT based Steganography", Global Journal of Computer Science and Technology, P a g e | 4 Vol. 10 Issue 1 (Ver 1. 0), April 2010
  • Ken Cabeen and Peter Gent , "Image Compression and Discrete Cosine Transform"
  • Matthew Warren Dodd , "Applications of the Discrete Fourier Transform in Information Theory and Cryptology", PhD Thesis, Royal Holloway and Bedford New College, University of London
  • James L. Massey, "The Discrete Fourier Transform in Coding and Cryptography", ITW 1998, San Diego, CA, February 8 – 11
  • Robert T. McKeon, Member, Steganography using the Fourier Transform and Zero-Padding Aliasing Properties (May 2006), IEEE
  • Po-Yueh Chen and Hung-Ju Lin , "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering, 2006. 4, 3: 275-290
  • Frederick S. Brundick and Lisa M. Marvel, "Implementation of Spread Spectrum Image Steganography", ARMY Research Laboratory, March 2001
  • Luis Perez-Freire, Pierre Moulin and Fernando Perez-Gonzalez, "Security of spread-spectrum-based data hiding", SPIE Proceedings Vol. 6505, February 2007
  • Sharon Rose Govada, Bonu Satish Kumar, "Text Steganography with Multi level Shielding", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
  • Dr. Natarajan Meghanathan, "Information Hiding through Cover Generation: Using Context-Free Grammar"
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Steganography Steganalysis Cover Medium Stego Object Stego Medium

Powered by PhDFocusTM