Image Steganography Using Frequency Domain
Dr. MAHESH KUMAR, MUNESH YADAV
Keywords: Genetic Algorithm, Audio Steganography algorithm
Abstract: Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Technologies that are closely related to steganography and watermarking and fingerprinting . High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm. Quantized-frequency Secure Audio Steganography algorithm. Integer Transform based Secure Audio Steganography algorithm.
 Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
 Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 27:10, October 2002
 Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998
 Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999
 Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001
 Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999
 Lee, Y.K. & Chen, L.H., “High capacity image steganographic model”, Visual Image Signal Processing, 127:03, June 2000
 Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April 1998
 Venkatraman, S., Abraham, A. & Paprzycki, M., “Significance of Steganography on Data Security”,Proceedings of the International Conference on Information Technology: Coding and Computing, 2002
 Gonzalez, R.C. and Woods, R.E., Digital Image Processing using MATLAB, Pearson Education, India,2006.
 Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999.
 A.M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in: Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April 2006, pp. 1–6.
 Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April
 Provos, N. & Honeyman, P., “Hide and Seek: An introduction to steganography”, IEEE Security and Privacy Journal, 2003
 Krenn, R., “Steganography and Steganalysis”, http://www.krenn.nl/univ/cry/steg/article.pdf
 C.-C. Chang, T.-S. Chen and L.-Z. Chung, “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, vol. 121, 2002, pp. 123-138.
 R. Chu, X. You, X. Kong and X. Ba, “A DCT-based image steganographic method resisting statistical attacks”, InProceedings of (ICASSP '02), IEEE International Conferenceon Acoustics, Speech, and Signal Processing, 17-21 May.vol.5, 2002, pp V-953-6.
 Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001