International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 2- Issue 11, November 2013 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Data Security Using Image Steganography And Weighing Its Techniques

[Full Text]



Pritam Kumari, Chetna Kumar, Preeyanshi, Jaya Bhushan



Index Terms: carrier, cover, embedded, obscurity, Stego-image



Abstract: Steganography is the art of covering secret and confidential information within a carrier which could be an image file, video file or audio file. It is a technique which provides invisible communication since an image file which has the secret information embedded within it is delivered to the receiver instead of the secret information itself. The focus of this paper is to provide immense understanding of the Image Steganography technique - its history, advantages over cryptography, process model and comparison of its techniques.



[1] M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.). Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008

[2] Rosziati Ibrahim and Teoh Suk Kuan “Steganography Algorithm to Hide Secret Message inside an Image”, Computer Technology and Application 2 (2011) 102-108

[3] Y.K.Lee and L.H.Chen “High capacity image steganographic model”

[4] Atallah M. Al-Shatnawi “A New Method in Image Steganography with Improved Image Quality,” in Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 – 3915

[5] Khalil Challita and Hikmat Farhat, “Combining Steganography and Cryptography: New Directions,” in International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): 199-208 The Society of Digital Information and Wireless Communications, 2011 (ISSN 2220-9085)

[6] Rosanne English,” Comparison of High Capacity Steganography Techniques”

[7] S Usha, G A Sathish Kumar, K Boopathybagan, “A Secure Triple Level Encryption Method Using Cryptography and Steganography” in 2011 International Conference on Computer Science and Network Technology

[8] Arvind Kumar and Km. Pooja, “Steganography- A Data Hiding Technique” in International Journal of Computer Applications (0975 – 8887)

[9] Kevin Curran and Karen Bailey, “An Evaluation of Image Based Steganography Methods,” in International Journal of Digital Evidence, Fall 2003, Volume 2, Issue 2

[10] Kanzariya Nitin K. and Nimavat Ashish V., “Comparison of Various Images Steganography Techniques” in International Journal of Computer Science and Management Research Vol 2 Issue 1 January 2013, ISSN 2278-733X

[11] Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete M. Ribeiro, “Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography,” in The 18th International Conference on Pattern Recognition (ICPR'06) 0-7695-2521-0/06 $20.00 © 2006

[12] Alaa A. Jabbar Altaay, Shahrin bin Sahib, Mazdak Zamani, “An Introduction to Image Steganography Techniques,” in 2012 International Conference on Advanced Computer Science Applications and Technologies

[13] Babloo Saha and Shuchi Sharma, “Steganographic Techniques of Data Hiding using Digital Images,” in Defence Science Journal, Vol. 62, No. 1, January 2012, pp. 11-18, 2012, DESIDOC

[14] A. Joseph Raphael and Dr. V. Sundaram, “Cryptography and Steganography – A Survey,” in Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630 ISSN: 2229-6093

[15] Nagham Hamid, Abid Yahya, R. Badlishah Ahmad & Osamah M. Al-Qershi, “Image Steganography Techniques: An Overview,” in International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3) : 2012

[16] Namita Tiwari and Dr.Madhu Shandilya, “Evaluation of Various LSB based Methods of Image Steganography on GIF File Format,” in International Journal of Computer Applications (0975 – 8887) Volume 6– No.2, September 2010