IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 9, September 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Image Steganography Using Frequency Domain

[Full Text]

 

AUTHOR(S)

Dr. MAHESH KUMAR, MUNESH YADAV

 

KEYWORDS

Keywords: Genetic Algorithm, Audio Steganography algorithm

 

ABSTRACT

Abstract: Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Technologies that are closely related to steganography and watermarking and fingerprinting . High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm. Quantized-frequency Secure Audio Steganography algorithm. Integer Transform based Secure Audio Steganography algorithm.

 

REFERENCES

[1] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf

[2] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 27:10, October 2002

[3] Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998

[4] Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999

[5] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001

[6] Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999

[7] Lee, Y.K. & Chen, L.H., “High capacity image steganographic model”, Visual Image Signal Processing, 127:03, June 2000

[8] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April 1998

[9] Venkatraman, S., Abraham, A. & Paprzycki, M., “Significance of Steganography on Data Security”,Proceedings of the International Conference on Information Technology: Coding and Computing, 2002

[10] http://en.wikipedia.org/wiki/Steganography

[11] Gonzalez, R.C. and Woods, R.E., Digital Image Processing using MATLAB, Pearson Education, India,2006.

[12] Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999.

[13] A.M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in: Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April 2006, pp. 1–6.

[14] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April

[15] Provos, N. & Honeyman, P., “Hide and Seek: An introduction to steganography”, IEEE Security and Privacy Journal, 2003

[16] Krenn, R., “Steganography and Steganalysis”, http://www.krenn.nl/univ/cry/steg/article.pdf

[17] C.-C. Chang, T.-S. Chen and L.-Z. Chung, “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, vol. 121, 2002, pp. 123-138.

[18] R. Chu, X. You, X. Kong and X. Ba, “A DCT-based image steganographic method resisting statistical attacks”, InProceedings of (ICASSP '02), IEEE International Conferenceon Acoustics, Speech, and Signal Processing, 17-21 May.vol.5, 2002, pp V-953-6.

[19] http://www.datahide.com/BPCSe/applications-e.html

[20] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001