SlideShare a Scribd company logo
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 6, Issue 1 (January 2017), PP.68-71
www.irjes.com 68 | Page
Survey Paper on Steganography
Namrata Singh
Computer Science and Engineering ABES Engineering College, Ghaziabad A.K.T.U
Abstract: Steganography is an art for hiding the secret information inside other information which are digitally
cover. The definition of steganography can also be given as study of unseen communication that usually deals
with existence of communicated message. The hidden message can be text, audio, image or video accordingly to
that it can be cover from either image or video. In steganography, hiding information achieved to insert a
message into cover image which generates a stego image. In this paper, we have analyze various steganography
methods and also covered classification and applications.
Keywords: Steganography, Data Hiding, Encryption, Stego-File, Video, Image
I. INTRODUCTION
In today’s world, the communication is the basic necessity of every growing area. Everyone wants the
secrecy and safety of their communicating data. In our daily life, we use many secure pathways like internet or
telephone for transferring and sharing information, but it's not safe at a certain level. In order to share the
information in a concealed manner two techniques could be used. These mechanisms are cryptography and
steganography. . In cryptography, the message is modified in an encrypted form with the help of encryption key
which is known to sender and receiver only. The message cannot be accessed by anyone without using the
encryption key. However, the transmission of encrypted message may easily arouse attacker’s suspicion, and the
encrypted message may thus be intercepted, attacked or decrypted violently. In order to overcome the
shortcomings of cryptographic techniques, steganography techniques have been developed. Steganography is
the art and science of communicating in such a way that it hides the existence of the communication. Thus,
steganography hides the existence of data so that no one can detect its presence. In steganography the process of
hiding information content inside any multimedia content like image, audio, video is referred as a ―Embedding‖.
For increasing the confidentiality of communicating data both the techniques may be combined. The remaining
paper consist of following section: II. Steganography III. Conclusion and Future Work.
II. STEGANOGRAPHY
Steganography is the practice of concealing a file, message, image, or video within another file,
message, image, or video. The word steganography combines the Greek words steganos, meaning "covered,
concealed, or protected", and graphein meaning "writing".
The advantage of steganography over cryptography alone is that the intended secret message does not
attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how
unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.
Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is
concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the
message. Steganography includes the concealment of information within computer files. In digital
steganography, electronic communications may include steganographic coding inside of a transport layer, such
as a document file, image file, program or protocol. Media files are ideal for steganographic transmission
because of their large size. For example, a sender might start with an innocuous image file and adjust the color
of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically
looking for it is unlikely to notice it.
The Steganography Method Used should have:
a) Imperceptibility: The video with data and original data source should be perceptually identical.
b) Robustness: The embedded data should survive any processing operation the host signal goes through and
preserve its fidelity.
c) Capacity: Maximum data embedding rate.
d) Secrecy: Extraction of hidden information from the video must not happen without prior permission of
intended user having password.
e) Accuracy: The extraction of the hidden data from the medium should be accurate and reliable.
Survey Paper On Steganography Namrata Singh
www.irjes.com 69 | Page
III. TERMINOLOGIES STEGANOGRAPHY
● Message: The Secret message which is meant to be sent/transmitted safely is known as Message.[3]
● Cover-object: Cover Object is basically the object in which the data is to be hidden. It may be image,
video and Audio.
● Stego-object: The object carrying the secret message is known as stego object.
● Stego-key: Key used for encrypting and decrypting the secret message..
● Embedding algorithm: Algorithm used to hide the message In the cover.
● Extracting algorithm: An algorithm used to unhide/uncover the message from the stego object.
IV. TYPES OF STEGANOGRAPHY
Depending on the type of the cover object there are many suita)e stenographic techniques which are in order to
obtain security.[1][4]
a) Image Steganography: The process of concealing the secret message in an image file is known as image
steganography. It has certain limitations like you cannot embed a large amount of data in an image because
it may distort which may arise suspicion that the image might contain any information.
b) Video Steganography: The process of concealing the secret message in an Video file is known as Video
steganography. Video Steganography is far more safe and efficient as compared to that of the image
steganography as you can embed large amount of data in audio and frames of the video.
c) Network Steganography: Network Steganography method uses modification of a single network protocol.
The protocol modification may be applied to the PDU (Protocol Data Unit), time relations between
exchanged PDUs, or both (hybrid methods). It is Highly secure and robust.
d) Audio Steganography: In Audio Steganography audio is used as the cover to hide the secret information it
is also very robust in nature but with limitation of the amount of data one can hide.
e) Text Steganography: Secret Data is hided in a text file. This method lacks robustness and is not that much
efficient in hiding the data. It can be easily detected by the eyes of intruders.
IV. STEGANOGRAPHY MEASURES
a) Imperceptibility: A steganographic process is imperceptible when human eye cannot distinguish between
the cover image and the stego image.
b) Payload: It indicates the amount of secret information that can be embedded in the cover image. The
embedding rate is given in absolute measurement such as the length of the secret message.
c) Statistical Attacks: The process of extracting the secret information from the stego object is known as
statistical attack. The algo used for steganography must be robust to statistical attacks.
d) Security: Security of a steganographic system is defined in terms of undetectability, which is assured when
the statistical tests cannot distinguish between the cover and the stego-image.
e) Computational Cost: Data hiding and Data retrieval are the two parameters used to figure computational
cost of any steganography approach. Information concealing time alludes to the time required to implant
information inside a cover video edge and information recovery alludes to extraction time of mystery message
from the stego outline.
f) Perceptual Quality: Increasing the payload degrade the quality of the video so approach should be used such
that the quality should remain intact to avoid it from getting in sight.
V. STEGANOGRAPHY TECHNIQUES
Steganography techniques can be divided into following domains : [2]
a) Frequency Domain Technique:
This is a more complex way of hiding information in an image various algorithms and transformations
are used on the image to hide information in it frequency domain embedding can be termed as a domain of
embedding techniques for which a number of algorithms have been suggested frequency domain are broadly
classified into :
● Discrete Fourier transformation technique: The Discrete Fourier Transform to get frequency component for
each pixel value. The Discrete Fourier Transform (DFT) of spatial value f(x, y) for the image of size M x N
is defined in equation for frequency domain transformation.
● Discrete cosine transformation technique: The discrete cosine transform (DCT) is a technique for
converting a signal into elementary frequency components. It is widely used in image compression.
● Discrete Wavelet transformation technique: A discrete wavelet transform (DWT) is any wavelet transform
for which the wavelets are discretely sampled.
Survey Paper On Steganography Namrata Singh
www.irjes.com 70 | Page
b) Spatial Domain Methods:
There are many versions of spatial steganography' a directly change some bits in the image pixel values
in hiding data A directly change some bits in the image pixel values in hiding data. Spatial domain techniques
are broadly classified into:
● Least significant Bit : The least significant bit is the lowest bit in a series of numbers in binary the LSB is
located at the far right of a string. For example, in the binary number: 10111001, the least significant bit is
the far right 1. Here the secret information is stored in the LSB of the image.
● Pixel value differencing : The pixel-value differencing (PVD) scheme provides high imperceptibility to
the stego image by selecting two consecutive pixels and designs a quantization range table to determine the
payload by the difference value between the consecutive pixels.
● Edge based data embedding method: In ELSB, we use all the edge pixels in an image. Here, we first
calculate the masked image by masking the two LSB bits in the cover image. Then we identify the edge
pixels by using the Canny Edge detection method. After obtaining the edge pixels we hide the data in the
LSB bits of the edge pixels only and send the stego object to the receiver.
● Random pixel embedding method: random pixels are used to embed and send the stego object to the
receiver.
VI. COMPARISON TABLE
Criterion/Meth
od
SteganographyWatermarkingEncryption
Carrierany digital
media
mostly
image/audio
files
usually text
based, with
some
extensions to
image files
Secret datapayloadwatermarkplain text
Keyoptionaloptionalnecessary
Input filesat least two
unless in self-
embedding
at least two
unless in self-
embedding
one
Detectionblindusually
informative
(i.e., original
cover or
watermark is
needed for
recovery)
blind
Authenticationfull retrieval of
data
usually
achieved by
cross
correlation
full retrieval of
data
Objectivesecrete
communication
copyright
preserving
data protection
Resultstego-filewatermarked-
file
cipher-text
Concerndelectability/
capacity
robustnessrobustness
Type of attackssteganalysisimage
processing
cryptanalysis
Visibilityneversometimesalways
Fails whenit is detectedit is
removed/replac
ed
de-ciphered
Relation to
cover
not necessarily
related to the
cover. The
message is
more important
than the cover.
usually
becomes an
attribute of the
cover image.
The cover is
more important
than the
message.
N/A
Flexibilityfree to choose
any suitable
cover
cover choice is
restricted
N/A
Historyvery ancient
except its
digital version
modern eramodern era
Survey Paper On Steganography Namrata Singh
www.irjes.com 71 | Page
VII. CONCLUSION
This paper gave an overview of different steganographic techniques its major types and classification
of steganography which have been proposed in the literature during past few years.
ACKNOWLEDGMENT
This Paper is completed by referring various research papers on steganography techniques and their
overview and I really appreciate the hard work and dedication done by the authors of the papers
REFERENCES
[1]. Volume-2, Issue-5, May-2015 ISSN: 2349-7637 (Online) RESEARCH HUB – International
Multidisciplinary Research Journal (RHIMRJ) Research Paper Available online at: www.rhimrj.com
2015, RHIMRJ, All Rights Reserved Page 1 of 5 ISSN: 2349-7637 (Online) A Survey Paper on
Steganography and Cryptography Z. V. Patel1st Student, M.Tech. C. U. Shah College of Engineering
and Technology, Surendranagar, Gujarat (India) S. A. Gadhiya2nd Head, B.E.(IT) C. U. Shah College
of Engineering and Technology, Surendranagar, Gujarat (India)
[2]. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in
Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com
An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques
Mukesh Garg* A.P. Gurudev Jangra M.Tech. Scholar H.O.D in CSE Department Jind Institute of
Engineering & Technology Jind Institute of Engineering & Technol
[3]. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in
Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com
An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques
Mukesh Garg* A.P. Gurudev Jangra M.Tech. Scholar H.O.D in CSE Department Jind Institute of
Engineering & Technology Jind Institute of Engineering & Technology Jind, Haryana 126102, India
Jind, Haryana 126102, India
[4]. International Journal of Innovative Research in Computer and Communication Engineering (A High
Impact Factor, Monthly, Peer Reviewed Journal) Vol. 4, Issue 1, January 2016 Copyright to IJIRCCE
DOI: 10.15680/IJIRCCE.2016. 0401158 721 A Survey Paper on Steganography Techniques Dr.
Rajkumar L Biradar1 , Ambika Umashetty2 Associate Professor, Dept. of Electronics and Telematics,
G. Narayanamma Institute of Technology & Science, Hyderabad, India1 Dept. of Computer Science &
Engineering, Appa Institute of Engineering & Technology, Kalaburagi, India2

More Related Content

What's hot

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
Praneeta Dehare
 
D010312230
D010312230D010312230
D010312230
IOSR Journals
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
Abhishek Dhara
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
A Study on Video Steganographic Techniques
A Study on Video Steganographic TechniquesA Study on Video Steganographic Techniques
A Study on Video Steganographic Techniques
ijceronline
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
International Journal of Science and Research (IJSR)
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Ijetr042105
Ijetr042105Ijetr042105
Steganography
SteganographySteganography
SteganographySonam M
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar reportTejas_srinivas
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
Steganography
SteganographySteganography
Steganography
bhaskarnarula
 

What's hot (20)

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
D010312230
D010312230D010312230
D010312230
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
A Study on Video Steganographic Techniques
A Study on Video Steganographic TechniquesA Study on Video Steganographic Techniques
A Study on Video Steganographic Techniques
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
ANURADHA_FINAL_REPORT
ANURADHA_FINAL_REPORTANURADHA_FINAL_REPORT
ANURADHA_FINAL_REPORT
 
Steganography
SteganographySteganography
Steganography
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Steganography
SteganographySteganography
Steganography
 

Similar to Survey Paper on Steganography

A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
ssusere02009
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
F1803023843
F1803023843F1803023843
F1803023843
IOSR Journals
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Journal For Research
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
IAEME Publication
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IJNSA Journal
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
ssuser50a5ec
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
IJET - International Journal of Engineering and Techniques
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
journalBEEI
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 

Similar to Survey Paper on Steganography (20)

A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
F1803023843
F1803023843F1803023843
F1803023843
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 

More from IRJESJOURNAL

Drying of agricultural products using forced convection indirect solar dryer
Drying of agricultural products using forced convection indirect solar dryerDrying of agricultural products using forced convection indirect solar dryer
Drying of agricultural products using forced convection indirect solar dryer
IRJESJOURNAL
 
The Problems of Constructing Optimal Onboard Colored RGB Depicting UAV Systems
The Problems of Constructing Optimal Onboard Colored RGB Depicting UAV SystemsThe Problems of Constructing Optimal Onboard Colored RGB Depicting UAV Systems
The Problems of Constructing Optimal Onboard Colored RGB Depicting UAV Systems
IRJESJOURNAL
 
Flexible Design Processes to Reduce the Early Obsolescence of Buildings
Flexible Design Processes to Reduce the Early Obsolescence of BuildingsFlexible Design Processes to Reduce the Early Obsolescence of Buildings
Flexible Design Processes to Reduce the Early Obsolescence of Buildings
IRJESJOURNAL
 
Study on Performance Enhancement of Solar Ejector Cooling System
Study on Performance Enhancement of Solar Ejector Cooling SystemStudy on Performance Enhancement of Solar Ejector Cooling System
Study on Performance Enhancement of Solar Ejector Cooling System
IRJESJOURNAL
 
Flight Safety Case Study: Adi Sucipto Airport Jogjakarta - Indonesia
Flight Safety Case Study: Adi Sucipto Airport Jogjakarta - IndonesiaFlight Safety Case Study: Adi Sucipto Airport Jogjakarta - Indonesia
Flight Safety Case Study: Adi Sucipto Airport Jogjakarta - Indonesia
IRJESJOURNAL
 
A Review of Severe Plastic Deformation
A Review of Severe Plastic DeformationA Review of Severe Plastic Deformation
A Review of Severe Plastic Deformation
IRJESJOURNAL
 
Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...
Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...
Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...
IRJESJOURNAL
 
Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...
Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...
Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...
IRJESJOURNAL
 
Correlation of True Boiling Point of Crude Oil
Correlation of True Boiling Point of Crude OilCorrelation of True Boiling Point of Crude Oil
Correlation of True Boiling Point of Crude Oil
IRJESJOURNAL
 
Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...
Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...
Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...
IRJESJOURNAL
 
ICT governance in Higher Education
ICT governance in Higher EducationICT governance in Higher Education
ICT governance in Higher Education
IRJESJOURNAL
 
Gobernanzade las TIC en la Educacion Superior
Gobernanzade las TIC en la Educacion SuperiorGobernanzade las TIC en la Educacion Superior
Gobernanzade las TIC en la Educacion Superior
IRJESJOURNAL
 
The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...
The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...
The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...
IRJESJOURNAL
 
Research on The Bottom Software of Electronic Control System In Automobile El...
Research on The Bottom Software of Electronic Control System In Automobile El...Research on The Bottom Software of Electronic Control System In Automobile El...
Research on The Bottom Software of Electronic Control System In Automobile El...
IRJESJOURNAL
 
Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...
Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...
Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...
IRJESJOURNAL
 
Linking Ab Initio-Calphad for the Assessment of the AluminiumLutetium System
Linking Ab Initio-Calphad for the Assessment of the AluminiumLutetium SystemLinking Ab Initio-Calphad for the Assessment of the AluminiumLutetium System
Linking Ab Initio-Calphad for the Assessment of the AluminiumLutetium System
IRJESJOURNAL
 
Thermodynamic Assessment (Suggestions) Of the Gold-Rubidium System
Thermodynamic Assessment (Suggestions) Of the Gold-Rubidium SystemThermodynamic Assessment (Suggestions) Of the Gold-Rubidium System
Thermodynamic Assessment (Suggestions) Of the Gold-Rubidium System
IRJESJOURNAL
 
Elisa Test for Determination of Grapevine Viral Infection in Rahovec, Kosovo
Elisa Test for Determination of Grapevine Viral Infection in Rahovec, KosovoElisa Test for Determination of Grapevine Viral Infection in Rahovec, Kosovo
Elisa Test for Determination of Grapevine Viral Infection in Rahovec, Kosovo
IRJESJOURNAL
 
Modelling of Sealing Elements Wearing
Modelling of Sealing Elements WearingModelling of Sealing Elements Wearing
Modelling of Sealing Elements Wearing
IRJESJOURNAL
 
Determining Loss of Liquid from Different Types of Mud by Various Addictives ...
Determining Loss of Liquid from Different Types of Mud by Various Addictives ...Determining Loss of Liquid from Different Types of Mud by Various Addictives ...
Determining Loss of Liquid from Different Types of Mud by Various Addictives ...
IRJESJOURNAL
 

More from IRJESJOURNAL (20)

Drying of agricultural products using forced convection indirect solar dryer
Drying of agricultural products using forced convection indirect solar dryerDrying of agricultural products using forced convection indirect solar dryer
Drying of agricultural products using forced convection indirect solar dryer
 
The Problems of Constructing Optimal Onboard Colored RGB Depicting UAV Systems
The Problems of Constructing Optimal Onboard Colored RGB Depicting UAV SystemsThe Problems of Constructing Optimal Onboard Colored RGB Depicting UAV Systems
The Problems of Constructing Optimal Onboard Colored RGB Depicting UAV Systems
 
Flexible Design Processes to Reduce the Early Obsolescence of Buildings
Flexible Design Processes to Reduce the Early Obsolescence of BuildingsFlexible Design Processes to Reduce the Early Obsolescence of Buildings
Flexible Design Processes to Reduce the Early Obsolescence of Buildings
 
Study on Performance Enhancement of Solar Ejector Cooling System
Study on Performance Enhancement of Solar Ejector Cooling SystemStudy on Performance Enhancement of Solar Ejector Cooling System
Study on Performance Enhancement of Solar Ejector Cooling System
 
Flight Safety Case Study: Adi Sucipto Airport Jogjakarta - Indonesia
Flight Safety Case Study: Adi Sucipto Airport Jogjakarta - IndonesiaFlight Safety Case Study: Adi Sucipto Airport Jogjakarta - Indonesia
Flight Safety Case Study: Adi Sucipto Airport Jogjakarta - Indonesia
 
A Review of Severe Plastic Deformation
A Review of Severe Plastic DeformationA Review of Severe Plastic Deformation
A Review of Severe Plastic Deformation
 
Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...
Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...
Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...
 
Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...
Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...
Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...
 
Correlation of True Boiling Point of Crude Oil
Correlation of True Boiling Point of Crude OilCorrelation of True Boiling Point of Crude Oil
Correlation of True Boiling Point of Crude Oil
 
Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...
Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...
Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...
 
ICT governance in Higher Education
ICT governance in Higher EducationICT governance in Higher Education
ICT governance in Higher Education
 
Gobernanzade las TIC en la Educacion Superior
Gobernanzade las TIC en la Educacion SuperiorGobernanzade las TIC en la Educacion Superior
Gobernanzade las TIC en la Educacion Superior
 
The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...
The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...
The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...
 
Research on The Bottom Software of Electronic Control System In Automobile El...
Research on The Bottom Software of Electronic Control System In Automobile El...Research on The Bottom Software of Electronic Control System In Automobile El...
Research on The Bottom Software of Electronic Control System In Automobile El...
 
Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...
Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...
Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...
 
Linking Ab Initio-Calphad for the Assessment of the AluminiumLutetium System
Linking Ab Initio-Calphad for the Assessment of the AluminiumLutetium SystemLinking Ab Initio-Calphad for the Assessment of the AluminiumLutetium System
Linking Ab Initio-Calphad for the Assessment of the AluminiumLutetium System
 
Thermodynamic Assessment (Suggestions) Of the Gold-Rubidium System
Thermodynamic Assessment (Suggestions) Of the Gold-Rubidium SystemThermodynamic Assessment (Suggestions) Of the Gold-Rubidium System
Thermodynamic Assessment (Suggestions) Of the Gold-Rubidium System
 
Elisa Test for Determination of Grapevine Viral Infection in Rahovec, Kosovo
Elisa Test for Determination of Grapevine Viral Infection in Rahovec, KosovoElisa Test for Determination of Grapevine Viral Infection in Rahovec, Kosovo
Elisa Test for Determination of Grapevine Viral Infection in Rahovec, Kosovo
 
Modelling of Sealing Elements Wearing
Modelling of Sealing Elements WearingModelling of Sealing Elements Wearing
Modelling of Sealing Elements Wearing
 
Determining Loss of Liquid from Different Types of Mud by Various Addictives ...
Determining Loss of Liquid from Different Types of Mud by Various Addictives ...Determining Loss of Liquid from Different Types of Mud by Various Addictives ...
Determining Loss of Liquid from Different Types of Mud by Various Addictives ...
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 

Survey Paper on Steganography

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 6, Issue 1 (January 2017), PP.68-71 www.irjes.com 68 | Page Survey Paper on Steganography Namrata Singh Computer Science and Engineering ABES Engineering College, Ghaziabad A.K.T.U Abstract: Steganography is an art for hiding the secret information inside other information which are digitally cover. The definition of steganography can also be given as study of unseen communication that usually deals with existence of communicated message. The hidden message can be text, audio, image or video accordingly to that it can be cover from either image or video. In steganography, hiding information achieved to insert a message into cover image which generates a stego image. In this paper, we have analyze various steganography methods and also covered classification and applications. Keywords: Steganography, Data Hiding, Encryption, Stego-File, Video, Image I. INTRODUCTION In today’s world, the communication is the basic necessity of every growing area. Everyone wants the secrecy and safety of their communicating data. In our daily life, we use many secure pathways like internet or telephone for transferring and sharing information, but it's not safe at a certain level. In order to share the information in a concealed manner two techniques could be used. These mechanisms are cryptography and steganography. . In cryptography, the message is modified in an encrypted form with the help of encryption key which is known to sender and receiver only. The message cannot be accessed by anyone without using the encryption key. However, the transmission of encrypted message may easily arouse attacker’s suspicion, and the encrypted message may thus be intercepted, attacked or decrypted violently. In order to overcome the shortcomings of cryptographic techniques, steganography techniques have been developed. Steganography is the art and science of communicating in such a way that it hides the existence of the communication. Thus, steganography hides the existence of data so that no one can detect its presence. In steganography the process of hiding information content inside any multimedia content like image, audio, video is referred as a ―Embedding‖. For increasing the confidentiality of communicating data both the techniques may be combined. The remaining paper consist of following section: II. Steganography III. Conclusion and Future Work. II. STEGANOGRAPHY Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos, meaning "covered, concealed, or protected", and graphein meaning "writing". The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it. The Steganography Method Used should have: a) Imperceptibility: The video with data and original data source should be perceptually identical. b) Robustness: The embedded data should survive any processing operation the host signal goes through and preserve its fidelity. c) Capacity: Maximum data embedding rate. d) Secrecy: Extraction of hidden information from the video must not happen without prior permission of intended user having password. e) Accuracy: The extraction of the hidden data from the medium should be accurate and reliable.
  • 2. Survey Paper On Steganography Namrata Singh www.irjes.com 69 | Page III. TERMINOLOGIES STEGANOGRAPHY ● Message: The Secret message which is meant to be sent/transmitted safely is known as Message.[3] ● Cover-object: Cover Object is basically the object in which the data is to be hidden. It may be image, video and Audio. ● Stego-object: The object carrying the secret message is known as stego object. ● Stego-key: Key used for encrypting and decrypting the secret message.. ● Embedding algorithm: Algorithm used to hide the message In the cover. ● Extracting algorithm: An algorithm used to unhide/uncover the message from the stego object. IV. TYPES OF STEGANOGRAPHY Depending on the type of the cover object there are many suita)e stenographic techniques which are in order to obtain security.[1][4] a) Image Steganography: The process of concealing the secret message in an image file is known as image steganography. It has certain limitations like you cannot embed a large amount of data in an image because it may distort which may arise suspicion that the image might contain any information. b) Video Steganography: The process of concealing the secret message in an Video file is known as Video steganography. Video Steganography is far more safe and efficient as compared to that of the image steganography as you can embed large amount of data in audio and frames of the video. c) Network Steganography: Network Steganography method uses modification of a single network protocol. The protocol modification may be applied to the PDU (Protocol Data Unit), time relations between exchanged PDUs, or both (hybrid methods). It is Highly secure and robust. d) Audio Steganography: In Audio Steganography audio is used as the cover to hide the secret information it is also very robust in nature but with limitation of the amount of data one can hide. e) Text Steganography: Secret Data is hided in a text file. This method lacks robustness and is not that much efficient in hiding the data. It can be easily detected by the eyes of intruders. IV. STEGANOGRAPHY MEASURES a) Imperceptibility: A steganographic process is imperceptible when human eye cannot distinguish between the cover image and the stego image. b) Payload: It indicates the amount of secret information that can be embedded in the cover image. The embedding rate is given in absolute measurement such as the length of the secret message. c) Statistical Attacks: The process of extracting the secret information from the stego object is known as statistical attack. The algo used for steganography must be robust to statistical attacks. d) Security: Security of a steganographic system is defined in terms of undetectability, which is assured when the statistical tests cannot distinguish between the cover and the stego-image. e) Computational Cost: Data hiding and Data retrieval are the two parameters used to figure computational cost of any steganography approach. Information concealing time alludes to the time required to implant information inside a cover video edge and information recovery alludes to extraction time of mystery message from the stego outline. f) Perceptual Quality: Increasing the payload degrade the quality of the video so approach should be used such that the quality should remain intact to avoid it from getting in sight. V. STEGANOGRAPHY TECHNIQUES Steganography techniques can be divided into following domains : [2] a) Frequency Domain Technique: This is a more complex way of hiding information in an image various algorithms and transformations are used on the image to hide information in it frequency domain embedding can be termed as a domain of embedding techniques for which a number of algorithms have been suggested frequency domain are broadly classified into : ● Discrete Fourier transformation technique: The Discrete Fourier Transform to get frequency component for each pixel value. The Discrete Fourier Transform (DFT) of spatial value f(x, y) for the image of size M x N is defined in equation for frequency domain transformation. ● Discrete cosine transformation technique: The discrete cosine transform (DCT) is a technique for converting a signal into elementary frequency components. It is widely used in image compression. ● Discrete Wavelet transformation technique: A discrete wavelet transform (DWT) is any wavelet transform for which the wavelets are discretely sampled.
  • 3. Survey Paper On Steganography Namrata Singh www.irjes.com 70 | Page b) Spatial Domain Methods: There are many versions of spatial steganography' a directly change some bits in the image pixel values in hiding data A directly change some bits in the image pixel values in hiding data. Spatial domain techniques are broadly classified into: ● Least significant Bit : The least significant bit is the lowest bit in a series of numbers in binary the LSB is located at the far right of a string. For example, in the binary number: 10111001, the least significant bit is the far right 1. Here the secret information is stored in the LSB of the image. ● Pixel value differencing : The pixel-value differencing (PVD) scheme provides high imperceptibility to the stego image by selecting two consecutive pixels and designs a quantization range table to determine the payload by the difference value between the consecutive pixels. ● Edge based data embedding method: In ELSB, we use all the edge pixels in an image. Here, we first calculate the masked image by masking the two LSB bits in the cover image. Then we identify the edge pixels by using the Canny Edge detection method. After obtaining the edge pixels we hide the data in the LSB bits of the edge pixels only and send the stego object to the receiver. ● Random pixel embedding method: random pixels are used to embed and send the stego object to the receiver. VI. COMPARISON TABLE Criterion/Meth od SteganographyWatermarkingEncryption Carrierany digital media mostly image/audio files usually text based, with some extensions to image files Secret datapayloadwatermarkplain text Keyoptionaloptionalnecessary Input filesat least two unless in self- embedding at least two unless in self- embedding one Detectionblindusually informative (i.e., original cover or watermark is needed for recovery) blind Authenticationfull retrieval of data usually achieved by cross correlation full retrieval of data Objectivesecrete communication copyright preserving data protection Resultstego-filewatermarked- file cipher-text Concerndelectability/ capacity robustnessrobustness Type of attackssteganalysisimage processing cryptanalysis Visibilityneversometimesalways Fails whenit is detectedit is removed/replac ed de-ciphered Relation to cover not necessarily related to the cover. The message is more important than the cover. usually becomes an attribute of the cover image. The cover is more important than the message. N/A Flexibilityfree to choose any suitable cover cover choice is restricted N/A Historyvery ancient except its digital version modern eramodern era
  • 4. Survey Paper On Steganography Namrata Singh www.irjes.com 71 | Page VII. CONCLUSION This paper gave an overview of different steganographic techniques its major types and classification of steganography which have been proposed in the literature during past few years. ACKNOWLEDGMENT This Paper is completed by referring various research papers on steganography techniques and their overview and I really appreciate the hard work and dedication done by the authors of the papers REFERENCES [1]. Volume-2, Issue-5, May-2015 ISSN: 2349-7637 (Online) RESEARCH HUB – International Multidisciplinary Research Journal (RHIMRJ) Research Paper Available online at: www.rhimrj.com 2015, RHIMRJ, All Rights Reserved Page 1 of 5 ISSN: 2349-7637 (Online) A Survey Paper on Steganography and Cryptography Z. V. Patel1st Student, M.Tech. C. U. Shah College of Engineering and Technology, Surendranagar, Gujarat (India) S. A. Gadhiya2nd Head, B.E.(IT) C. U. Shah College of Engineering and Technology, Surendranagar, Gujarat (India) [2]. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques Mukesh Garg* A.P. Gurudev Jangra M.Tech. Scholar H.O.D in CSE Department Jind Institute of Engineering & Technology Jind Institute of Engineering & Technol [3]. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques Mukesh Garg* A.P. Gurudev Jangra M.Tech. Scholar H.O.D in CSE Department Jind Institute of Engineering & Technology Jind Institute of Engineering & Technology Jind, Haryana 126102, India Jind, Haryana 126102, India [4]. International Journal of Innovative Research in Computer and Communication Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 4, Issue 1, January 2016 Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0401158 721 A Survey Paper on Steganography Techniques Dr. Rajkumar L Biradar1 , Ambika Umashetty2 Associate Professor, Dept. of Electronics and Telematics, G. Narayanamma Institute of Technology & Science, Hyderabad, India1 Dept. of Computer Science & Engineering, Appa Institute of Engineering & Technology, Kalaburagi, India2