SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-1, Issue-9, November 2013
42 www.erpublication.org

Abstract— Steganography dates back to ancient Greece and
had been in use for at least 2500 years by now. It has been
widely used for military, diplomatic, personal and intellectual
property applications. However, advanced techniques are often
overlooked. Briefly stated, steganography is the art of hiding
information within every day, innocuous objects and concealing
the fact that communication is taking place.
Index Terms— Cryptography, Security, Steganalysis
Steganography.
I. INTRODUCTION
Steganography (from Greek steganos and graphie) is the
science of concealing the presence of data even when it is
being sought.[2] Cryptography might hide the essence of the
message, but this has proven to be inadequate for many
applications. Steganography employs various technologies
like digital signal processing, cryptography, information
theory, data compression, math, and human audio/visual
perception etc. The goal often is a tradeoff between the
security and the amount of data that can be hidden as, the
chances of third parties finding out that there is a hidden
communication going on increase with the increase in the
amount of hidden data. Steganographic robustness is another
target, that watermarking is not concerned with. The hidden
data must withstand image/audio manipulations such as
contrast, brightness, cropping, stretching,
analog-to-digital-to-analog conversion, etc. There is a large
commercial interest in watermarking for digital rights
management. Author of [2] argues that there are three levels
of failure for steganography: 1) detection, 2) extraction, and
3) destruction. Even if somebody detects the data, extraction
and destruction of the data must be difficult. A third party can
insert random data once the algorithm is known. He rates the
perceptibility in 3 levels: 1) Indistinguishable, 2) can see/hear
distortion when looking/listening closely for it, 3) blatantly
obvious to a casual observer. [2]
II. HISTORY
Steganography has been used for ages and they date back to
ancient Greece. Ancient methods relied on physical
steganography where the carriers were simple covers like wax
tablets with inscriptions in the underlying wood. Other
methods are microdot technology which employed tiny dots
drawing hardly any attention, the use of invisible inks like
lemon juice, milk etc. that turn dark when heated, and the
Manuscript received November 12, 2013.
Nisha M B, Masters in Comp science from Manipal Institute of
Technology where her research elective was Security. She Worked on
Virtualization for 7+ years with 4+ years exclusively on security features of
various Virtualization technologies.
messages written on silk balls that the ancient Chinese
messengers swallowed.
III. USES
1. Confidential communication where it protects not only the
data but also the parties involved
2. Secret data storage. Sensitive and private information can
be stored safely in a location.
3. Implementation of watermarking.
4. e- commerce transaction verification.
5. Communication concerning national security
6. The transportation of sensitive data past eavesdroppers.
Fig. 1. Eric Hernandez [12]
IV. STEGANOGRAPHY AND CRYPTOGRAPHY
Cryptography scrambles messages and transforms it into a
new file through an algorithm where steganography hides a
file within another object. With cryptography, anybody can
see that there is an encrypted message. Advances in
steganography are always countered by advances in
steganalysis which defeats steganographic techniques.
Existing methods of hiding information can be significantly
improved by combining encryption and steganography, as a
solution. A basic method of combining the two is to encrypt
the message before attempting to hide it. The main advantage
is that the detection of message alone does not defeat the
system.
V. STEGANOGRAPHIC TECHNIQUES
A. Least Significant Bit (LSB)
It is a simple technique which modifies only the least
significant portions of the image. The Most Significant Bit
(MSB) of the hidden image that contributes ½ the information
is inserted into the Least Significant Bit (LSB) of the cover
Steganography: An Enticing Exploration
Nisha Mannukkunnel BalanPillai
Steganography: An Enticing Exploration
43 www.erpublication.org
image that contributes 1/256th of the information. This
difference is not perceivable to unsuspecting human eyes.
Fig. 2. Eric Hernandez [12]
B. Bit Plane Complexity Segmentation (BPCS)
BPCS is similar to LSB, but calculates the complexity of
regions within an image and replaces those regions with
complexity above a certain value with new data. It can be used
for 24-bit true colour or 8-bit gryscale images but not on
paletted images.
Fig. 3. Daniel Stoleru [10]
C. Direct Cosine Transformation
DCT based image compression relies on quantization of the
image‘s DCT coefficient and their entropy coding. Even
though vulnerable to noise, it distributes data more evenly and
in a more robust way compared to the LSB method.
D. Wavelet Transformation
Wavelet transformations are better at high compression
levels. In this method, the coefficients of the wavelets are
altered with the noise within tolerable levels. It has a
promising future in research.
E. Spread Spectrum
Spread spectrum systems encode data as a binary sequence
which sounds like noise but which can be recognized by a
receiver with the correct key. The technique has been used by
the military since the 1940s because the signals are hard to
jam or intercept as they are lost in the background noise.
Spread spectrum techniques can be used for watermarking by
matching the narrow bandwidth of the embedded data to the
large bandwidth of the medium.
Fig. 4. Eric Hernandez [12]
VI. LIMITATIONS
The usefulness of steganography ends at the point where the
recipient and non-recipient possess the same knowledge level
of the information. The intended recipient might miss the
information unless there is a ‗shared secret‘ [11]. There arises
the need for another secretive information exchange which
complicates things.
Steganography excessively depends on the medium that is
used to hide the message. This excessive dependence restricts
room for improvement.
Comparison of original image and the stego-image can be
fatal. Therefore original image must be destroyed prior to
communication.
Beginning of a new exchange can be suspicious. Similarly the
pattern of images sent should not create doubts to third
parties. The exchange must look as genuine as possible.
VII. DETECTION
The need to detect steganographic data arises when terrorists
and pedophiles use it as a medium for illegal activities. The
main problem steganalysis faces is the sheer volume of data to
be analysed. Recognizing stego images online and in spam
mail does not seem like a finite task. The dynamic nature of
internet is another hurdle. Images and data appear and
disappear in seconds. The vast variety of hiding techniques
make detection difficult, too.
VIII. SOME KNOWN USAGES
Steganography is a continually advancing field, and
researchers are always coming up with ways to improve
steganography, steganalysis, and watermarking.
Steganography is used by some color laser printer
manufacturers to identify counterfeiters. It contains the
encoded printer serial numbers, date and time stamps
In 2001 , daily newspaper in USA reported "Terror groups
hide behind Web encryption". In October 2001, the New
York Times published an article claiming that terrorists had
used steganography to encode messages into images, and then
transported these via e-mail and possibly via USENET to
prepare and execute the September 11, 2001 terrorist attack.
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-1, Issue-9, November 2013
44 www.erpublication.org
IX. PRESENT RESEARCH & FUTURE
Pascal Schöttle and Rainer Böhme proposed an approach
of combining game theory with content-adaptive
steganographic security in 14th Information Hiding
Conference, 2012 held in California. They defined a new kind
of adaptive embedding, the so-called strategic adaptive
steganography, which takes into account the knowledge of the
attacker by being able to recover (or estimate) the adaptivity
criterion. As per them a rigorous understanding of
content-adaptive steganography in theory and practice
remains a relevant target for future investigations.
Dola Saha, Aveek Dutta, Dirk Grunwald and Douglas Sicker
proposed another approach called Dirty Constellation to
implement high capacity,covert channel by encoding covert
information in the physical layer of common wireless
communication protocols, in IH conference 2012. This can
ensure high degree of undetectability.
In the future, digital camera manufacturers could implement
steganographic features as a part of camera firmware to
annotate pictures with the photographer's copyright
information. Camcorder manufacturers could also follow suit
and implement steganography and watermarking techniques
for protecting video content captured on camcorders and
video cameras. Going forward, legitimate applications such
as tagging of multimedia content with hidden information
could become an important application area for
steganography.
X. CONCLUSION
The field needs more research in order to develop
undetectable techniques. Steganography has increased appeal
in areas where encryption is outlawed. With the advances in
Steganalysis, Steganography will have to develop more
sophisticated techniques.
Digital watermarking is a potential future application. It can
track the owners of copyrighted work and prevent illegal
distribution.
The future of research in steganography may be limited by the
law as there are reports claiming that steganography is
employed by terrorists. Developing new applications for
steganography becomes important at this point. Future
developments will include the applications to media other
than images.
Future research will include the application to vessels other
than 24-bit images. The advantages and disadvantages of
existing methods have to be studied extensively in order to
develop more sophisticated approaches.
Encryption and steganography combined sensibly can be a
powerful data hiding method. Efforts should be made for the
techniques to survive image manipulation techniques and
attacks. Also the selection of covers and the degradation of
quality resulting from the steganographic technique of the
vessel requires careful consideration.
Theft and false representation are just some of the issues that
need to be resolved.
REFERENCES
[1] Counterintelligence News and Developments, Volume 2, June
1998 ―Hidden in Plain Sight-Steganography‖ URL:
www.nacic.gov/pubs/news/1998/jun98.htm
[2] An Introduction to More Advanced Steganography
[3] International Journal of Computer Applications (0975 – 8887)
Volume 9– No.7, November 2010
[4] Attacks on Steganographic Systems Breaking the Steganographic
Utilities EzStego, Jsteg, Steganos, and S-Tools—and Some
Lessons Learned
[5] A Survey of Data Mining Techniques for Steganalysis: Farid
Ghareh Mohammadi and Mohammad Saniee Abadeh Faculty of
Electrical and Computer Engineering, Tarbiat Modares
University Iran
[6] Steganography in Different Colour Models Using an Energy
Adjustment Applying Wavelets: Blanca E. Carvajal-Gámez,
Francisco J. Gallegos-Funes, Alberto J. Rosales-Silva and Rene
Santiago-Cruz National Polytechnic Institute, Higher School of
Mechanical and Electrical Engineering, Edif. Z-4, 3er. Piso,
ESIME SEPI-Electrónica, Col. Lindavista, México DF., México
[7] RABS: Rule-Based Adaptive Batch Steganography: Hedieh Sajedi
Tehran University, Tarbiat Modares University, Iran
[8] Contemporary Approaches to the Histogram Modification Based
Data Hiding Techniques: Yildiray Yalman1, Feyzi Akar2 and
Ismail Erturk1 1Turgut Ozal University, 2Turkish Naval
Academy, Turkey
[9] Lossless Steganography for Speech Communications: Naofumi
Aoki Graduate School of Information Science and Technology,
Hokkaido University, Japan
[10] Visual Cryptography and Bit-Plane Complexity Segmentation:
Daniel Stoleru
[11] Current State of Steganography: Sophie Engle
[12] Survey of steganography: With an emphasis on audio techniques
by Eric Hernandez
[13] Secret Agent Radio : Covert communication through dirty
constellations : Dola Saha, Aveek Dutta, Dirk Grunwald and
Douglas Sicker, IH conferene 2012
[14] A Game-Theoretic Approach to Content-Adaptive
Steganography : Pascal Schöttle and Rainer Böhme, IH
Conference 2012
[15] "Secret Code in Color Printers Lets Government Track You; Tiny
Dots Show Where and When You Made Your Print", Electronic
Frontier Foundation.
Nisha M B., VMware Inc
Nisha did Masters in Comp science from Manipal Institute of
Technology where her research elective was Security. She Worked on
Virtualization for 7+ years with 4+ years exclusively on security
features of various Virtualization technologies.

More Related Content

What's hot

Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCSCJournals
 
A Review paper on Steganography Techniques
A Review paper on Steganography TechniquesA Review paper on Steganography Techniques
A Review paper on Steganography TechniquesEditor IJMTER
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 

What's hot (19)

Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
 
A Review paper on Steganography Techniques
A Review paper on Steganography TechniquesA Review paper on Steganography Techniques
A Review paper on Steganography Techniques
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
L1803037377
L1803037377L1803037377
L1803037377
 
G018143943
G018143943G018143943
G018143943
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
F1803023843
F1803023843F1803023843
F1803023843
 

Viewers also liked (20)

Ijetr011743
Ijetr011743Ijetr011743
Ijetr011743
 
Ijetr011945
Ijetr011945Ijetr011945
Ijetr011945
 
Ijetr011915
Ijetr011915Ijetr011915
Ijetr011915
 
Ijetr011921
Ijetr011921Ijetr011921
Ijetr011921
 
Ijetr011813
Ijetr011813Ijetr011813
Ijetr011813
 
Ijetr011960
Ijetr011960Ijetr011960
Ijetr011960
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Ijetr011954
Ijetr011954Ijetr011954
Ijetr011954
 
Ijetr011948
Ijetr011948Ijetr011948
Ijetr011948
 
Ijetr011959
Ijetr011959Ijetr011959
Ijetr011959
 
Ijetr012011
Ijetr012011Ijetr012011
Ijetr012011
 
Ijetr012001
Ijetr012001Ijetr012001
Ijetr012001
 
Ijetr011834
Ijetr011834Ijetr011834
Ijetr011834
 
Ijetr011842
Ijetr011842Ijetr011842
Ijetr011842
 
Ijetr011923
Ijetr011923Ijetr011923
Ijetr011923
 
Ijetr011847
Ijetr011847Ijetr011847
Ijetr011847
 
Ijetr011823
Ijetr011823Ijetr011823
Ijetr011823
 
Ijetr011814
Ijetr011814Ijetr011814
Ijetr011814
 
Ijetr011958
Ijetr011958Ijetr011958
Ijetr011958
 
Ijetr011836
Ijetr011836 Ijetr011836
Ijetr011836
 

Similar to Ijetr011937

A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdfssuser50a5ec
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques IJECEIAES
 
eai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdfeai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdfssuser50a5ec
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfssuserff72e4
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image SteganographyNathan Mathis
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
 

Similar to Ijetr011937 (20)

A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Steganography
Steganography Steganography
Steganography
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
eai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdfeai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdf
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image Shielding
 

More from ER Publication.org (20)

Ijetr011101
Ijetr011101Ijetr011101
Ijetr011101
 
Ijetr021232
Ijetr021232Ijetr021232
Ijetr021232
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetr021228
Ijetr021228Ijetr021228
Ijetr021228
 
Ijetr021226
Ijetr021226Ijetr021226
Ijetr021226
 
Ijetr021224
Ijetr021224Ijetr021224
Ijetr021224
 
Ijetr021221
Ijetr021221Ijetr021221
Ijetr021221
 
Ijetr021220
Ijetr021220Ijetr021220
Ijetr021220
 
Ijetr021215
Ijetr021215Ijetr021215
Ijetr021215
 
Ijetr021211
Ijetr021211Ijetr021211
Ijetr021211
 
Ijetr021210
Ijetr021210Ijetr021210
Ijetr021210
 
Ijetr021207
Ijetr021207Ijetr021207
Ijetr021207
 
Ijetr021146
Ijetr021146Ijetr021146
Ijetr021146
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
Ijetr021144
Ijetr021144Ijetr021144
Ijetr021144
 
Ijetr021143
Ijetr021143Ijetr021143
Ijetr021143
 
Ijetr021140
Ijetr021140Ijetr021140
Ijetr021140
 
Ijetr021139
Ijetr021139Ijetr021139
Ijetr021139
 
Ijetr021138
Ijetr021138Ijetr021138
Ijetr021138
 
Ijetr021135
Ijetr021135Ijetr021135
Ijetr021135
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Ijetr011937

  • 1. International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-1, Issue-9, November 2013 42 www.erpublication.org  Abstract— Steganography dates back to ancient Greece and had been in use for at least 2500 years by now. It has been widely used for military, diplomatic, personal and intellectual property applications. However, advanced techniques are often overlooked. Briefly stated, steganography is the art of hiding information within every day, innocuous objects and concealing the fact that communication is taking place. Index Terms— Cryptography, Security, Steganalysis Steganography. I. INTRODUCTION Steganography (from Greek steganos and graphie) is the science of concealing the presence of data even when it is being sought.[2] Cryptography might hide the essence of the message, but this has proven to be inadequate for many applications. Steganography employs various technologies like digital signal processing, cryptography, information theory, data compression, math, and human audio/visual perception etc. The goal often is a tradeoff between the security and the amount of data that can be hidden as, the chances of third parties finding out that there is a hidden communication going on increase with the increase in the amount of hidden data. Steganographic robustness is another target, that watermarking is not concerned with. The hidden data must withstand image/audio manipulations such as contrast, brightness, cropping, stretching, analog-to-digital-to-analog conversion, etc. There is a large commercial interest in watermarking for digital rights management. Author of [2] argues that there are three levels of failure for steganography: 1) detection, 2) extraction, and 3) destruction. Even if somebody detects the data, extraction and destruction of the data must be difficult. A third party can insert random data once the algorithm is known. He rates the perceptibility in 3 levels: 1) Indistinguishable, 2) can see/hear distortion when looking/listening closely for it, 3) blatantly obvious to a casual observer. [2] II. HISTORY Steganography has been used for ages and they date back to ancient Greece. Ancient methods relied on physical steganography where the carriers were simple covers like wax tablets with inscriptions in the underlying wood. Other methods are microdot technology which employed tiny dots drawing hardly any attention, the use of invisible inks like lemon juice, milk etc. that turn dark when heated, and the Manuscript received November 12, 2013. Nisha M B, Masters in Comp science from Manipal Institute of Technology where her research elective was Security. She Worked on Virtualization for 7+ years with 4+ years exclusively on security features of various Virtualization technologies. messages written on silk balls that the ancient Chinese messengers swallowed. III. USES 1. Confidential communication where it protects not only the data but also the parties involved 2. Secret data storage. Sensitive and private information can be stored safely in a location. 3. Implementation of watermarking. 4. e- commerce transaction verification. 5. Communication concerning national security 6. The transportation of sensitive data past eavesdroppers. Fig. 1. Eric Hernandez [12] IV. STEGANOGRAPHY AND CRYPTOGRAPHY Cryptography scrambles messages and transforms it into a new file through an algorithm where steganography hides a file within another object. With cryptography, anybody can see that there is an encrypted message. Advances in steganography are always countered by advances in steganalysis which defeats steganographic techniques. Existing methods of hiding information can be significantly improved by combining encryption and steganography, as a solution. A basic method of combining the two is to encrypt the message before attempting to hide it. The main advantage is that the detection of message alone does not defeat the system. V. STEGANOGRAPHIC TECHNIQUES A. Least Significant Bit (LSB) It is a simple technique which modifies only the least significant portions of the image. The Most Significant Bit (MSB) of the hidden image that contributes ½ the information is inserted into the Least Significant Bit (LSB) of the cover Steganography: An Enticing Exploration Nisha Mannukkunnel BalanPillai
  • 2. Steganography: An Enticing Exploration 43 www.erpublication.org image that contributes 1/256th of the information. This difference is not perceivable to unsuspecting human eyes. Fig. 2. Eric Hernandez [12] B. Bit Plane Complexity Segmentation (BPCS) BPCS is similar to LSB, but calculates the complexity of regions within an image and replaces those regions with complexity above a certain value with new data. It can be used for 24-bit true colour or 8-bit gryscale images but not on paletted images. Fig. 3. Daniel Stoleru [10] C. Direct Cosine Transformation DCT based image compression relies on quantization of the image‘s DCT coefficient and their entropy coding. Even though vulnerable to noise, it distributes data more evenly and in a more robust way compared to the LSB method. D. Wavelet Transformation Wavelet transformations are better at high compression levels. In this method, the coefficients of the wavelets are altered with the noise within tolerable levels. It has a promising future in research. E. Spread Spectrum Spread spectrum systems encode data as a binary sequence which sounds like noise but which can be recognized by a receiver with the correct key. The technique has been used by the military since the 1940s because the signals are hard to jam or intercept as they are lost in the background noise. Spread spectrum techniques can be used for watermarking by matching the narrow bandwidth of the embedded data to the large bandwidth of the medium. Fig. 4. Eric Hernandez [12] VI. LIMITATIONS The usefulness of steganography ends at the point where the recipient and non-recipient possess the same knowledge level of the information. The intended recipient might miss the information unless there is a ‗shared secret‘ [11]. There arises the need for another secretive information exchange which complicates things. Steganography excessively depends on the medium that is used to hide the message. This excessive dependence restricts room for improvement. Comparison of original image and the stego-image can be fatal. Therefore original image must be destroyed prior to communication. Beginning of a new exchange can be suspicious. Similarly the pattern of images sent should not create doubts to third parties. The exchange must look as genuine as possible. VII. DETECTION The need to detect steganographic data arises when terrorists and pedophiles use it as a medium for illegal activities. The main problem steganalysis faces is the sheer volume of data to be analysed. Recognizing stego images online and in spam mail does not seem like a finite task. The dynamic nature of internet is another hurdle. Images and data appear and disappear in seconds. The vast variety of hiding techniques make detection difficult, too. VIII. SOME KNOWN USAGES Steganography is a continually advancing field, and researchers are always coming up with ways to improve steganography, steganalysis, and watermarking. Steganography is used by some color laser printer manufacturers to identify counterfeiters. It contains the encoded printer serial numbers, date and time stamps In 2001 , daily newspaper in USA reported "Terror groups hide behind Web encryption". In October 2001, the New York Times published an article claiming that terrorists had used steganography to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the September 11, 2001 terrorist attack.
  • 3. International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-1, Issue-9, November 2013 44 www.erpublication.org IX. PRESENT RESEARCH & FUTURE Pascal Schöttle and Rainer Böhme proposed an approach of combining game theory with content-adaptive steganographic security in 14th Information Hiding Conference, 2012 held in California. They defined a new kind of adaptive embedding, the so-called strategic adaptive steganography, which takes into account the knowledge of the attacker by being able to recover (or estimate) the adaptivity criterion. As per them a rigorous understanding of content-adaptive steganography in theory and practice remains a relevant target for future investigations. Dola Saha, Aveek Dutta, Dirk Grunwald and Douglas Sicker proposed another approach called Dirty Constellation to implement high capacity,covert channel by encoding covert information in the physical layer of common wireless communication protocols, in IH conference 2012. This can ensure high degree of undetectability. In the future, digital camera manufacturers could implement steganographic features as a part of camera firmware to annotate pictures with the photographer's copyright information. Camcorder manufacturers could also follow suit and implement steganography and watermarking techniques for protecting video content captured on camcorders and video cameras. Going forward, legitimate applications such as tagging of multimedia content with hidden information could become an important application area for steganography. X. CONCLUSION The field needs more research in order to develop undetectable techniques. Steganography has increased appeal in areas where encryption is outlawed. With the advances in Steganalysis, Steganography will have to develop more sophisticated techniques. Digital watermarking is a potential future application. It can track the owners of copyrighted work and prevent illegal distribution. The future of research in steganography may be limited by the law as there are reports claiming that steganography is employed by terrorists. Developing new applications for steganography becomes important at this point. Future developments will include the applications to media other than images. Future research will include the application to vessels other than 24-bit images. The advantages and disadvantages of existing methods have to be studied extensively in order to develop more sophisticated approaches. Encryption and steganography combined sensibly can be a powerful data hiding method. Efforts should be made for the techniques to survive image manipulation techniques and attacks. Also the selection of covers and the degradation of quality resulting from the steganographic technique of the vessel requires careful consideration. Theft and false representation are just some of the issues that need to be resolved. REFERENCES [1] Counterintelligence News and Developments, Volume 2, June 1998 ―Hidden in Plain Sight-Steganography‖ URL: www.nacic.gov/pubs/news/1998/jun98.htm [2] An Introduction to More Advanced Steganography [3] International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 [4] Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools—and Some Lessons Learned [5] A Survey of Data Mining Techniques for Steganalysis: Farid Ghareh Mohammadi and Mohammad Saniee Abadeh Faculty of Electrical and Computer Engineering, Tarbiat Modares University Iran [6] Steganography in Different Colour Models Using an Energy Adjustment Applying Wavelets: Blanca E. Carvajal-Gámez, Francisco J. Gallegos-Funes, Alberto J. Rosales-Silva and Rene Santiago-Cruz National Polytechnic Institute, Higher School of Mechanical and Electrical Engineering, Edif. Z-4, 3er. Piso, ESIME SEPI-Electrónica, Col. Lindavista, México DF., México [7] RABS: Rule-Based Adaptive Batch Steganography: Hedieh Sajedi Tehran University, Tarbiat Modares University, Iran [8] Contemporary Approaches to the Histogram Modification Based Data Hiding Techniques: Yildiray Yalman1, Feyzi Akar2 and Ismail Erturk1 1Turgut Ozal University, 2Turkish Naval Academy, Turkey [9] Lossless Steganography for Speech Communications: Naofumi Aoki Graduate School of Information Science and Technology, Hokkaido University, Japan [10] Visual Cryptography and Bit-Plane Complexity Segmentation: Daniel Stoleru [11] Current State of Steganography: Sophie Engle [12] Survey of steganography: With an emphasis on audio techniques by Eric Hernandez [13] Secret Agent Radio : Covert communication through dirty constellations : Dola Saha, Aveek Dutta, Dirk Grunwald and Douglas Sicker, IH conferene 2012 [14] A Game-Theoretic Approach to Content-Adaptive Steganography : Pascal Schöttle and Rainer Böhme, IH Conference 2012 [15] "Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print", Electronic Frontier Foundation. Nisha M B., VMware Inc Nisha did Masters in Comp science from Manipal Institute of Technology where her research elective was Security. She Worked on Virtualization for 7+ years with 4+ years exclusively on security features of various Virtualization technologies.