SlideShare a Scribd company logo
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 180
A Brief study on Steganography techniques
Kavitha K J, Pushpalatha O
Asst Prof, Department of ECE, JIT, Davanagere, Karnataka, India
Abstract— As there is a lot of advancement in the field of
internet or communication technology, we have various
means of storing, accessing and distribution of the data in
the digital format. Due to the rapid advancement in this
field has also introduced many challenges to the
researchers to provide security to the information which is
transmitted over the network. The digital information
circulating over the network also includes the medical
information. In order to provide security, confidentiality
and integrity, the steganographic techniques can be
employed. In the section 1, it gives the introduction about
available hiding techniques; the section 2 explains the
various steganography properties, the section 3 gives the
types of steganographic techniques, the section 4 gives the
applications of steganography, the section 5 gives the
quality parameters to be measured for medical information,
and the section 6 gives the steganographic algorithms
available. Finally the section 7 concludes that to prevent
unauthorized access steganography is the suitable
technique.
Keywords— Steganography, security, integrity.
I. INTRODUCTION
Nowadays the technology has rationally developed so that
controlling and dealing out of secret data are done on
internet because of the common usage of internet. The
information needs to be transmitted or exchanged over the
Internet for many purposes. In some cases we may need to
keep the information confidentially. In such cases if we
directly transmit the information, it may be misused by the
hackers and may be used for illegal purpose. To avoid such
cases security can be provided for the information in three
ways [13].
1. Cryptography
2. Steganography
3. Water marking
Each technique is discussed in brief:
Fig.1: Hiding Techniques
Cryptography which is also called as cryptology is
actually derived from Greek word kryptos means that
"hidden, secret".
Cryptography [3] can be defined as a technique of storing
and transmitting data in a particular form so that only those
for whom it is intended can read and process it or in other
words we can define it as a secret writing or encoding of
messages in secret code and decoding of the information
only by the authorized persons.
Cryptography may again classify as:
1. Symmetric Key Cryptography
2. Asymmetric Key Cryptography
Steganography is pronounced STEHG-uh-NAH-gruhf-
ee, from Greek steganos, or "covered," and graphie, or
"writing". It is defined as “hiding of a secret message
within a usual message and the removal of it at its
target” [4]. Steganography is used to hide an encoded
message so that no one doubts it exists. Ideally, anyone
glance over our data will fail to know it contains
translated data.
Steganography can also be classified as:
1. Linguistic
2. Technical which includes audio, text, video and image.
Water marking is a technique of hiding the
information in a cover image. This technique may be
used to verify the authenticity, integrity or in other
words can be used to show the owner ship [5]. The
digital watermark can be broadly classified in to two
types:
Visible watermark
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 181
Invisible watermark
Among the above three hiding techniques, steganography
plays an important role in providing the security to the
information which is exchanged over internet. The
steganography can be implemented as shown below:
Fig.2: Steganography process
II. PROPERTIES OF STEGANOGRAPHY
The following are the some of the key properties of steganography
method which will motivate many of us to use this technique for
protecting the information [1].
Imperceptibility: Imperceptibility is the property in which,
it is very difficult to distinguish between the original and
the steganographic image or information.
Data Payload capacity: This parameter defines the amount
of secret data or number of bits that can be inserted in the
message without [9] degrading the quality of the image.
Robustness: It is the parameter used to measure the degree
of withstanding the ability to avoid the destroying of the
embedded information without affecting the quality of the
cover image.
III. TYPES OF STEGANOGRAPHIC
TECHNIQUES
The techniques used to embed the information can be
broadly classified under two categories:
Spatial domain: It is also called substitution method. In this
steganographic technique, the data that is to be hidden is
directly embedded in the pixels of the image. Least
significant bit (LSB) [7 & 8] method is the most popularly
used spatial domain technique in which it substitutes the
least significant bit of original pixel with the message bit
and the human eye will not be able to detect the hidden
information in the message. Many other spatial domain
methods are also available such as Code word grouping –
palette generation algorithm, Adaptive Steganography,
Steganography Algorithm using Pattern Matching with
External Hardware, Pixel Indicator etc.
Transform domain: this technique is also called frequency
domain technique. In this technique, first the information or
the message is converted into frequency domain [11] and
then in to the transformed image, a confidential data can be
hidden.
In order to perform the conversion from time domain in to
frequency domain, various techniques are available such as
DCT, DWT, and DFT etc. Among all the techniques, DWT
yields better results.
IV. APPLICATIONS OF STEGANOGRAPHY
Nowadays Steganography is widely used in many
applications. Some of the applications are listed below:
Private communication and secret data storing
Security for data modification
Access control system for digital content sharing
And many others
Historically, steganography provides the following:
Potential capability to hide the presence of private data
Very hard to detect the hidden or embedded data
Improving the secrecy of the encoded data
In the field of communication, if we want to transmit some
confidential data, then the first step is to select some
dummy message depending on the size of the data that is to
be embedded. Later the confidential data can be embedded
in the dummy message using some encryption algorithms
along with the key generated. Later to extract the
confidential data, the extraction program can be used with
the help of the same key which was generated during the
process of embedding.
The data that is to be embedded is fragile in most of the
cases, it means that the embedded data can be altered or
undergoes modification [10] by the unauthorized parties. If
it is altered or modified, it is easily detected by the
extraction program.
Nowadays the digital information is becoming more
popular as it can be easily transmitted to many of the
receivers over the internet with free charges. In some case
the information that we need to transmit is very valuable, in
that case simply transmitting the information may be
accessed by illegal people and lead to the misuse of the
information. Especially in case of legal cases, the protection
of information is very important. In such cases, we can
issue a special “access key” in order to extract the
information at the receiver side which is possible with the
help of steganographic techniques.
Among all the above applications, Medical information
transformation [2] is one of the important applications
which are playing an important role nowadays.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 182
When the higher diagnosis is required from a specialist who
might be at some remote places, in such cases, the
information or the image needs to be transmitted over the
internet. The transmitted information may be misused by
some unauthorized persons. In order to avoid such
possibilities, we can employ steganographic techniques to
protect the information. While applying the technique, care
should be taken to see that the information or the image
should undergo degradation because a small change in the
information or image may lead to the misdiagnosis which
may result in the disastrous result.
Nowadays most of the researchers working on color images
and videos using steganographic techniques. And also work
is going on 3D images also.
V. QUALITY METRICS
Some of the quality parameters have to be used in order to
evaluate the quality of the images. The below paragraph
gives the metrics that are usually used to measure the
quality of the images after embedding the information into
the image.
Peak signal to Noise ration
Structural similarity index
Mean
Median
Bit error rate
Correlation coefficient
VI. STEGANOGRAPHIC ALGORITHMS
The various algorithms are available to perform the
steganographic process. Some of them are listed below
[12]:
Advanced Encryption Standard: The Advanced Encryption
Standard abbreviated as AES is a symmetric block cipher
[6] which is first used by the U.S. government in order to
protect classified information and is implemented in
software and hardware throughout the world to encrypt
sensitive data.
It was introduced in the year 1997 as a successor of Data
encryption standard DES.
International Data Encryption Algorithm: It is abbreviated
as IDEA which was developed first by Zurich, Switzerland.
This algorithm uses a block cipher with 128-bit key and is
considered to be very secure.
SEED: It is a symmetric encryption algorithm developed by
Korea Information Security Agency (KISA) and a group of
experts, in the year 1998. The input/output block size of
SEED is 128-bit and the key length is also 128-bit. A 128-
bit input is divided into two 64-bit blocks and the right 64-
bit block is an input to the round function with a 64-bit sub
key generated from the key scheduling.
Cipher algorithm: It is a mathematical formula which is
designed specifically to ambiguous the value and content of
data. Most valuable cipher algorithms use a key as part of
the formula. This key is used to encrypt the data, and either
that key or a complementary key is needed to decrypt the
data back to a useful form.
VII. CONCLUSION
In the above article we have seen there are many hiding
techniques available. One of them is steganography
technique which is widely used. And also we have seen
some of the algorithms. Using steganography with other
techniques, secureness can be increased for
images/information.
VIII. ACKNOWLEDGMENT
We thank our family members, friends and colleagues for
their support in preparing the paper.
REFERENCES
[1] B. Saha and S. Sharma, “Steganographic Techniques
of Data Hiding Using Digital Images (Review Paper),”
Defence Science Journal, vol. 62, no. 1, pp. 11–18,
Jan. 2012.
[2] P. Kamal and M. Punjab, “Review of Different
Steganographic techniques on Medical images
regarding their efficiency,” vol. 4, 2005.
[3] A. J. Raphael, “Cryptography and Steganography – A
Survey,” vol. 2, no. 3, pp. 626–630.
[4] R. A. Sampaio and M. P. Jackowski, “Assessment of
Steganographic Methods in Medical Imaging,” 1985.
[5] H. V. D. B. Sc, “Available Online at www.jgrcs.info
Steganography , Cryptography , Watermarking : A
Comparative Study,” vol. 3, no. 12, pp. 2010–2012,
2012.
[6] D. K. Sarmah and N. Bajpai, “Proposed System for
data hiding using Cryptography and Steganography,”
pp. 1–8.
[7] M. T. Student, “A SECURE DATA EMBEDDING
TECHNIQUE IN IMAGE STEGANOGRAPHY FOR
MEDICAL IMAGES,” vol. 3, no. 8, pp. 7753–7756,
2014.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 183
[8] V. Pandey, “International Journal of Advanced
Research in Computer Science and Software
Engineering Secure Medical Image Transmission
using Combined Approach of Data-hiding ,
Encryption and Steganography,” vol. 2, no. 12, pp.
54–57, 2012.
[9] P. Mortazavian, M. Jahangiri, E. Fatemizadeh, G. Y.
Av, A. Blv, and P. Sq, “ Proceedings of fourth
IASTED International conferece”, Spain,“A LOW-
DEGRADATION STEGANOGRAPHY MODEL,”
pp. 914–920, 2004.
[10]C. P. Sumathi, T. Santanam, and G. Umamaheswari,
“A Study of Various Steganographic Techniques Used
for Information Hiding,” vol. 4, no. 6, pp. 9–25, 2013.
[11]R. Doshi, P. Jain, and L. Gupta, “Steganography and
Its Applications in Security,” vol. 2, no. 6, pp. 4634–
4638, 2012.
[12]M. Umamaheswari, “Analysis of Different
Steganographic Algorithms for Secured Data Hiding,”
vol. 10, no. 8, pp. 154–160, 2010.
[13]C. Science and S. Engineering, “An Overview of
Different Type of Data Hiding Scheme in Image using
Steganographic Techniques,” vol. 4, no. 1, pp. 746–
751, 2014.

More Related Content

What's hot

Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
F1803023843
F1803023843F1803023843
F1803023843
IOSR Journals
 
Ijmet 10 01_002
Ijmet 10 01_002Ijmet 10 01_002
Ijmet 10 01_002
IAEME Publication
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
IAEME Publication
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
ijtsrd
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
Praneeta Dehare
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 

What's hot (19)

T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
F1803023843
F1803023843F1803023843
F1803023843
 
Ijmet 10 01_002
Ijmet 10 01_002Ijmet 10 01_002
Ijmet 10 01_002
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
319 325
319 325319 325
319 325
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
19_2
19_219_2
19_2
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 

Viewers also liked

Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
INFOGAIN PUBLICATION
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
INFOGAIN PUBLICATION
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
INFOGAIN PUBLICATION
 
Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...
Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...
Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...
INFOGAIN PUBLICATION
 
Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...
Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...
Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...
INFOGAIN PUBLICATION
 
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
INFOGAIN PUBLICATION
 
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
INFOGAIN PUBLICATION
 
Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch Kilian Fisher
 
Radiombligo, Un Fenomeno
Radiombligo, Un FenomenoRadiombligo, Un Fenomeno
Radiombligo, Un Fenomeno
FERMIN LEDESMA
 
Propriedade da Esperança Matemática
Propriedade da Esperança MatemáticaPropriedade da Esperança Matemática
Propriedade da Esperança Matemática
Anselmo Alves de Sousa
 
The Value of Network Neutrality to European Consumers
The Value of Network Neutrality to European ConsumersThe Value of Network Neutrality to European Consumers
The Value of Network Neutrality to European Consumers
René C.G. Arnold
 
Terapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferioresTerapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferiores
enriqueta jimenez cuadra
 
Charla marina emprende 28-4-16
Charla marina emprende 28-4-16Charla marina emprende 28-4-16
Charla marina emprende 28-4-16
Guiomar Ramírez-Montesinos
 
Technical sheet - Brackets for gravestones support
Technical sheet - Brackets for gravestones supportTechnical sheet - Brackets for gravestones support
Technical sheet - Brackets for gravestones support
Real Votiva Store
 
!البترول موجود ليبقى
!البترول موجود ليبقى !البترول موجود ليبقى
!البترول موجود ليبقى
Ashraf Osman
 
Dil E Sindh
Dil E Sindh Dil E Sindh
Dil E Sindh
Nandkumar Jethani
 
Instalando Xampp en Windows
Instalando Xampp en WindowsInstalando Xampp en Windows
Instalando Xampp en Windows
LeccionesWeb
 
DMCA Agent
DMCA AgentDMCA Agent
DMCA Agent
Walters Law Group
 
Presentatie fodmap sigrid-2015-mei- algemeen
Presentatie fodmap sigrid-2015-mei- algemeenPresentatie fodmap sigrid-2015-mei- algemeen
Presentatie fodmap sigrid-2015-mei- algemeen
Sigrid van der Marel-Sluijter
 

Viewers also liked (20)

Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...
Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...
Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...
 
Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...
Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...
Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...
 
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
 
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
 
Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch
 
Radiombligo, Un Fenomeno
Radiombligo, Un FenomenoRadiombligo, Un Fenomeno
Radiombligo, Un Fenomeno
 
Propriedade da Esperança Matemática
Propriedade da Esperança MatemáticaPropriedade da Esperança Matemática
Propriedade da Esperança Matemática
 
UR BOSNA MENU
UR BOSNA MENUUR BOSNA MENU
UR BOSNA MENU
 
The Value of Network Neutrality to European Consumers
The Value of Network Neutrality to European ConsumersThe Value of Network Neutrality to European Consumers
The Value of Network Neutrality to European Consumers
 
Terapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferioresTerapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferiores
 
Charla marina emprende 28-4-16
Charla marina emprende 28-4-16Charla marina emprende 28-4-16
Charla marina emprende 28-4-16
 
Technical sheet - Brackets for gravestones support
Technical sheet - Brackets for gravestones supportTechnical sheet - Brackets for gravestones support
Technical sheet - Brackets for gravestones support
 
!البترول موجود ليبقى
!البترول موجود ليبقى !البترول موجود ليبقى
!البترول موجود ليبقى
 
Dil E Sindh
Dil E Sindh Dil E Sindh
Dil E Sindh
 
Instalando Xampp en Windows
Instalando Xampp en WindowsInstalando Xampp en Windows
Instalando Xampp en Windows
 
DMCA Agent
DMCA AgentDMCA Agent
DMCA Agent
 
Presentatie fodmap sigrid-2015-mei- algemeen
Presentatie fodmap sigrid-2015-mei- algemeenPresentatie fodmap sigrid-2015-mei- algemeen
Presentatie fodmap sigrid-2015-mei- algemeen
 

Similar to Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):

Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODSSTEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
IRJET Journal
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
TELKOMNIKA JOURNAL
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IJNSA Journal
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET Journal
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
JIEMS Akkalkuwa
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IJNSA Journal
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
International Journal of Technical Research & Application
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Security
rahulmonikasharma
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
IAEME Publication
 

Similar to Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): (20)

Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODSSTEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Security
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
C01111519
C01111519C01111519
C01111519
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 180 A Brief study on Steganography techniques Kavitha K J, Pushpalatha O Asst Prof, Department of ECE, JIT, Davanagere, Karnataka, India Abstract— As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique. Keywords— Steganography, security, integrity. I. INTRODUCTION Nowadays the technology has rationally developed so that controlling and dealing out of secret data are done on internet because of the common usage of internet. The information needs to be transmitted or exchanged over the Internet for many purposes. In some cases we may need to keep the information confidentially. In such cases if we directly transmit the information, it may be misused by the hackers and may be used for illegal purpose. To avoid such cases security can be provided for the information in three ways [13]. 1. Cryptography 2. Steganography 3. Water marking Each technique is discussed in brief: Fig.1: Hiding Techniques Cryptography which is also called as cryptology is actually derived from Greek word kryptos means that "hidden, secret". Cryptography [3] can be defined as a technique of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it or in other words we can define it as a secret writing or encoding of messages in secret code and decoding of the information only by the authorized persons. Cryptography may again classify as: 1. Symmetric Key Cryptography 2. Asymmetric Key Cryptography Steganography is pronounced STEHG-uh-NAH-gruhf- ee, from Greek steganos, or "covered," and graphie, or "writing". It is defined as “hiding of a secret message within a usual message and the removal of it at its target” [4]. Steganography is used to hide an encoded message so that no one doubts it exists. Ideally, anyone glance over our data will fail to know it contains translated data. Steganography can also be classified as: 1. Linguistic 2. Technical which includes audio, text, video and image. Water marking is a technique of hiding the information in a cover image. This technique may be used to verify the authenticity, integrity or in other words can be used to show the owner ship [5]. The digital watermark can be broadly classified in to two types: Visible watermark
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 181 Invisible watermark Among the above three hiding techniques, steganography plays an important role in providing the security to the information which is exchanged over internet. The steganography can be implemented as shown below: Fig.2: Steganography process II. PROPERTIES OF STEGANOGRAPHY The following are the some of the key properties of steganography method which will motivate many of us to use this technique for protecting the information [1]. Imperceptibility: Imperceptibility is the property in which, it is very difficult to distinguish between the original and the steganographic image or information. Data Payload capacity: This parameter defines the amount of secret data or number of bits that can be inserted in the message without [9] degrading the quality of the image. Robustness: It is the parameter used to measure the degree of withstanding the ability to avoid the destroying of the embedded information without affecting the quality of the cover image. III. TYPES OF STEGANOGRAPHIC TECHNIQUES The techniques used to embed the information can be broadly classified under two categories: Spatial domain: It is also called substitution method. In this steganographic technique, the data that is to be hidden is directly embedded in the pixels of the image. Least significant bit (LSB) [7 & 8] method is the most popularly used spatial domain technique in which it substitutes the least significant bit of original pixel with the message bit and the human eye will not be able to detect the hidden information in the message. Many other spatial domain methods are also available such as Code word grouping – palette generation algorithm, Adaptive Steganography, Steganography Algorithm using Pattern Matching with External Hardware, Pixel Indicator etc. Transform domain: this technique is also called frequency domain technique. In this technique, first the information or the message is converted into frequency domain [11] and then in to the transformed image, a confidential data can be hidden. In order to perform the conversion from time domain in to frequency domain, various techniques are available such as DCT, DWT, and DFT etc. Among all the techniques, DWT yields better results. IV. APPLICATIONS OF STEGANOGRAPHY Nowadays Steganography is widely used in many applications. Some of the applications are listed below: Private communication and secret data storing Security for data modification Access control system for digital content sharing And many others Historically, steganography provides the following: Potential capability to hide the presence of private data Very hard to detect the hidden or embedded data Improving the secrecy of the encoded data In the field of communication, if we want to transmit some confidential data, then the first step is to select some dummy message depending on the size of the data that is to be embedded. Later the confidential data can be embedded in the dummy message using some encryption algorithms along with the key generated. Later to extract the confidential data, the extraction program can be used with the help of the same key which was generated during the process of embedding. The data that is to be embedded is fragile in most of the cases, it means that the embedded data can be altered or undergoes modification [10] by the unauthorized parties. If it is altered or modified, it is easily detected by the extraction program. Nowadays the digital information is becoming more popular as it can be easily transmitted to many of the receivers over the internet with free charges. In some case the information that we need to transmit is very valuable, in that case simply transmitting the information may be accessed by illegal people and lead to the misuse of the information. Especially in case of legal cases, the protection of information is very important. In such cases, we can issue a special “access key” in order to extract the information at the receiver side which is possible with the help of steganographic techniques. Among all the above applications, Medical information transformation [2] is one of the important applications which are playing an important role nowadays.
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 182 When the higher diagnosis is required from a specialist who might be at some remote places, in such cases, the information or the image needs to be transmitted over the internet. The transmitted information may be misused by some unauthorized persons. In order to avoid such possibilities, we can employ steganographic techniques to protect the information. While applying the technique, care should be taken to see that the information or the image should undergo degradation because a small change in the information or image may lead to the misdiagnosis which may result in the disastrous result. Nowadays most of the researchers working on color images and videos using steganographic techniques. And also work is going on 3D images also. V. QUALITY METRICS Some of the quality parameters have to be used in order to evaluate the quality of the images. The below paragraph gives the metrics that are usually used to measure the quality of the images after embedding the information into the image. Peak signal to Noise ration Structural similarity index Mean Median Bit error rate Correlation coefficient VI. STEGANOGRAPHIC ALGORITHMS The various algorithms are available to perform the steganographic process. Some of them are listed below [12]: Advanced Encryption Standard: The Advanced Encryption Standard abbreviated as AES is a symmetric block cipher [6] which is first used by the U.S. government in order to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. It was introduced in the year 1997 as a successor of Data encryption standard DES. International Data Encryption Algorithm: It is abbreviated as IDEA which was developed first by Zurich, Switzerland. This algorithm uses a block cipher with 128-bit key and is considered to be very secure. SEED: It is a symmetric encryption algorithm developed by Korea Information Security Agency (KISA) and a group of experts, in the year 1998. The input/output block size of SEED is 128-bit and the key length is also 128-bit. A 128- bit input is divided into two 64-bit blocks and the right 64- bit block is an input to the round function with a 64-bit sub key generated from the key scheduling. Cipher algorithm: It is a mathematical formula which is designed specifically to ambiguous the value and content of data. Most valuable cipher algorithms use a key as part of the formula. This key is used to encrypt the data, and either that key or a complementary key is needed to decrypt the data back to a useful form. VII. CONCLUSION In the above article we have seen there are many hiding techniques available. One of them is steganography technique which is widely used. And also we have seen some of the algorithms. Using steganography with other techniques, secureness can be increased for images/information. VIII. ACKNOWLEDGMENT We thank our family members, friends and colleagues for their support in preparing the paper. REFERENCES [1] B. Saha and S. Sharma, “Steganographic Techniques of Data Hiding Using Digital Images (Review Paper),” Defence Science Journal, vol. 62, no. 1, pp. 11–18, Jan. 2012. [2] P. Kamal and M. Punjab, “Review of Different Steganographic techniques on Medical images regarding their efficiency,” vol. 4, 2005. [3] A. J. Raphael, “Cryptography and Steganography – A Survey,” vol. 2, no. 3, pp. 626–630. [4] R. A. Sampaio and M. P. Jackowski, “Assessment of Steganographic Methods in Medical Imaging,” 1985. [5] H. V. D. B. Sc, “Available Online at www.jgrcs.info Steganography , Cryptography , Watermarking : A Comparative Study,” vol. 3, no. 12, pp. 2010–2012, 2012. [6] D. K. Sarmah and N. Bajpai, “Proposed System for data hiding using Cryptography and Steganography,” pp. 1–8. [7] M. T. Student, “A SECURE DATA EMBEDDING TECHNIQUE IN IMAGE STEGANOGRAPHY FOR MEDICAL IMAGES,” vol. 3, no. 8, pp. 7753–7756, 2014.
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 183 [8] V. Pandey, “International Journal of Advanced Research in Computer Science and Software Engineering Secure Medical Image Transmission using Combined Approach of Data-hiding , Encryption and Steganography,” vol. 2, no. 12, pp. 54–57, 2012. [9] P. Mortazavian, M. Jahangiri, E. Fatemizadeh, G. Y. Av, A. Blv, and P. Sq, “ Proceedings of fourth IASTED International conferece”, Spain,“A LOW- DEGRADATION STEGANOGRAPHY MODEL,” pp. 914–920, 2004. [10]C. P. Sumathi, T. Santanam, and G. Umamaheswari, “A Study of Various Steganographic Techniques Used for Information Hiding,” vol. 4, no. 6, pp. 9–25, 2013. [11]R. Doshi, P. Jain, and L. Gupta, “Steganography and Its Applications in Security,” vol. 2, no. 6, pp. 4634– 4638, 2012. [12]M. Umamaheswari, “Analysis of Different Steganographic Algorithms for Secured Data Hiding,” vol. 10, no. 8, pp. 154–160, 2010. [13]C. Science and S. Engineering, “An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques,” vol. 4, no. 1, pp. 746– 751, 2014.