Image Steganography Using Frequency Domain
[Full Text]
AUTHOR(S)
Dr. MAHESH KUMAR, MUNESH YADAV
KEYWORDS
Keywords: Genetic Algorithm, Audio Steganography algorithm
ABSTRACT
Abstract: Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Technologies that are closely related to steganography and watermarking and fingerprinting . High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm. Quantized-frequency Secure Audio Steganography algorithm. Integer Transform based Secure Audio Steganography algorithm.
REFERENCES
[1] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
[2] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 27:10, October 2002
[3] Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998
[4] Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999
[5] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001
[6] Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999
[7] Lee, Y.K. & Chen, L.H., “High capacity image steganographic model”, Visual Image Signal Processing, 127:03, June 2000
[8] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April 1998
[9] Venkatraman, S., Abraham, A. & Paprzycki, M., “Significance of Steganography on Data Security”,Proceedings of the International Conference on Information Technology: Coding and Computing, 2002
[10] http://en.wikipedia.org/wiki/Steganography
[11] Gonzalez, R.C. and Woods, R.E., Digital Image Processing using MATLAB, Pearson Education, India,2006.
[12] Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999.
[13] A.M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in: Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April 2006, pp. 1–6.
[14] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April
[15] Provos, N. & Honeyman, P., “Hide and Seek: An introduction to steganography”, IEEE Security and Privacy Journal, 2003
[16] Krenn, R., “Steganography and Steganalysis”, http://www.krenn.nl/univ/cry/steg/article.pdf
[17] C.-C. Chang, T.-S. Chen and L.-Z. Chung, “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, vol. 121, 2002, pp. 123-138.
[18] R. Chu, X. You, X. Kong and X. Ba, “A DCT-based image steganographic method resisting statistical attacks”, InProceedings of (ICASSP '02), IEEE International Conferenceon Acoustics, Speech, and Signal Processing, 17-21 May.vol.5, 2002, pp V-953-6.
[19] http://www.datahide.com/BPCSe/applications-e.html
[20] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001
|