A Study of Steganography Based Data Hiding Techniques

نویسنده

  • Vijay Kumar Sharma
چکیده

oday the exponential growth in internet users demand secure data communication, for that it is required to send the data in the form of encrypted or hidden form. Many information system security techniques are available. They are classified into three classes as cryptography, steganography and watermarking. This paper presents a review on steganography techniques and their uses and attacks on these. The steganography is commonly known as covert writing and mainly used in hidden communication. A reliable internet communication is free from the attacks on it. Keywords— Information system security, cryptography, steganography, watermarking.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of perturbed quantization (PQ) steganography based on empirical matrix

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography

A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography i...

متن کامل

A Review on Steganography Methods

In this paper we review different Steganography techniques for hiding the data. Steganography is a technique of hiding the data in any media in such a way that it remains confidential. This paper explores the different method of data hiding: image steganography, audio steganography, video steganography, text steganography, steganography in spatial domain, transform domain and adaptive steganogr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017