Open Access Open Access  Restricted Access Subscription or Fee Access

A Detail Survey on Image Steganography Techniques and Applications

Vandana Rajput, Sandeep Kumar Tiwari, Pankaj Sharma

Abstract


Steganography is working to achieve its significance owing to the growth and underground communication of possible computer operators on the internet. It may be distinct like the knowledge of unnoticeable communication that usually agreements with the methods of concealed occurrence of the interconnected message. The concealed information can be text, image, sound file, movie file, etc. In image steganography, undisclosed communication is attained to insert a message into protected image and produce a stegoimage (generated image which is carrying a hidden message). In this article, we show a study on steganography with its applications, types and techniques; and review of the existing work in steganography.

Cite this Article
Vandana Rajput, Sandeep Kumar Tiwari, Pankaj Sharma. A Detail Survey on Image Steganography Techniques and Applications. Journal of Open Source Developments. 2016; 3(2): 15–19p.


Keywords


Component, layout, styling, insert

Full Text:

PDF

References


Jasleen Kour, Deepankar Verma. Steganography Techniques: A Review

Paper. Worldwide Paper of Emerging Research in Management & Technology. 3(5). ISSN: 2278-9359.

Rina Mishra, Atish Mishra, Praveen Bhanodiya. An Border Based Picture Steganography with Firmness and Encryption. IEEE Global Meeting on Computer, Communication and Control (IC4-2015).

Pratap Chandra Mandal. Modern Steganographic Technique: A Survey. International Journal of Computer Science & Engineering Technology (IJCSET). Sep 2012; 3(9). ISSN: 2229-3345.

Morkel, Olivier MS, Eloff JHP. An Outline of Picture Steganography. ICSA Study Group Branch of Computer Science, University of Pretoria, 0002, Pretoria, South Africa.

Prajapati Hemang A, Chitaliya Nehal G. Secured and Robust Dual Image Steganography: A Survey. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE). Jan 2015; 1.

Tahir Ali Amit Doegar. A Novel Approach of LSB Based Steganography Using Parity Checker. Global Magazine of Higher Study in Software Engineering and Computer Science. Jan 2015; 5(1): 314–321p.

Mehdi Hussain, Mureed Hussain. A Survey of Image Steganography Techniques. International Journal of Advanced Science and Technology (IJAST). May 2013; 54.

Latika Yogita Gulati. Ananalysis of Steganography study and Development. Int J Adv Res Comput Sci Softw Eng. Apr 2015; 5(4): 871–874p.

Rahul Joshi, Lokesh Gagnani, Salony Pandey. Image Steganography With LSB. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET). Jan 2013; 2(1).

Hemalatha S, Dinesh Acharya U, Renuka A, et al. A Secure and High Capacity Image Steganography Technique. An International Journal (SIPIJ). Feb 2013; 4(1).

Vipul Sharma, Sunny Kumar. A New Approach to Hide Text in Images Using Steganography. Int J Adv Res Comput Sci Softw Eng. Apr 2013; 3(4).

Dipesh Agrawal, Samidha Diwedi Sharma. Analysis of Random Bit Image Steganography Techniques. International Journal of Computer Applications (0975-8887) International Conference on Recent

Trends in Engineering & Technology, 2013 (ICRTET'2013).

Kumar R, Chand S. A New Image Steganography Technique Based on Similarity in Secret Message. Confluence 2013: The Next Generation Information Technology Summit (4th International Conference) IET.

Ashima Wadhwa. A Survey on Audio Steganography Techniques for Digital Data Security. Int J Adv Res Comput Sci Softw Eng. Apr 2014; 4(4).

Dagar S. Highly Randomized Image Steganography Using Secret Keys. Recent Advances and Innovations in Engineering (ICRAIE). 9–11 May 2014.

Islam MR, Siddiqa A, Uddin MP, et al. An Efficient Filtering Based Approach Improving LSB Image Steganography Using Status Bit along with AES Cryptography. Informatics, Electronics & Vision (ICIEV), 2014 International Conference. 23–24 May 2014.


Refbacks

  • There are currently no refbacks.