Open Access Open Access  Restricted Access Subscription or Fee Access

Steganography Technique for Secure Transmission of Secret Message or Image

G. Satyavathy, Dr.M. Punithavalli

Abstract


Steganography is a relatively new field of study in Information Technology which deals with information hiding. Steganography or Stego literally means “covered writing”. Steganography is the art and science of communicating in a way which hides the existence of the communication. In divergence to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of Steganography is to camouflage messages in a way that does not allow any enemy to even detect the presence of secret messages. Steganographic research is primarily driven by the lack of strength in the cryptographic systems and the desire to have complete secrecy in an open-systems environment. This paper deals with a brief history of Steganography, various concepts and techniques of Steganography that is used for secure transmission of secret messages or images.


Keywords


Steganography, Cryptography, Camouflage, Transmission.

Full Text:

PDF

References


Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn Information Hiding-A Survey Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078, July 1999.

Gopalan, K. Audio steganography using bit modification, IEEE International Conference on Acoustics, Speech, and Signal Processing, Proceedings. (ICASSP apos;03). Vol. 2, Issue, 6-10 pp. II - 421-424. 2003

Baltrusaitis.J, Anamorphoses ou thaumaturgus opticus, pp. 5 and 15{19. Les perspectives depravees, Paris, France: Flammarion, ISBN 2-08-012604-0, 1984.

Chan, Y. K., Chang, C. C., Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure, IEEE Proceedings of the Third International Symposium on Cooperative Database Systems for Advanced Applications, pp. 194-199. 2001.

Johnson, N. F. and Jajodia, S. Exploring steganography: Seeing the unseen. Computer, 31(2):26–34, 1998.

Manchanda.S, Dave. M and Singh.S.B. Customized and Secure Image Steganography Through Random Numbers Logic, Signal Processing: An International Journal, Vol. 1, Issue 1, Pp. 1-16 2007.

Walia.E. and Jain. P. An Analysis of LSB & DCT based Steganography, Global Journal of Computer Science and Technology, Vol. 10, Issue 1, Pp. 4-8. 2010

Seckel, Your mind's eye: illusions & paradoxes of the visual system." Lecture for the National Science Week, University of Cambridge, England, Mar. 1998


Refbacks

  • There are currently no refbacks.