Critical Evaluation on Steganography Metrics

Article Preview

Abstract:

The objective of Steganography is to hide the information inside other data in order to avoid being spotted by the strangers. Steganography is an old-fashioned art that has been reborn in current years. This current paper provides a literature review on the security of Steganography organization and emphasizes on its measurements. The proposed algorithm introduces a novel hashing and encoding algorithm to generate a digital signature. Later, it has been embedded into the original data which doesnt require extra bandwidth for communication by signature.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

927-931

Citation:

Online since:

August 2013

Export:

Price:

[1] T.Kalker, G.Depovere, J.Haitsma and M.Maes, A Video Watermarking system for broadcast monitoring . In: SPIE Journals and Proceedings, 1999.

DOI: 10.1117/12.344661

Google Scholar

[2] A.Sarkar, K. Solanki, U. Madhow, S. Chandrasekaran and B. S. Manjunath, Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security. IN: IEEE International Conference on Acoustics, Speech and Signal Processing, 2007.Volume: 2, Page(s): 277 – 280.

DOI: 10.1109/icassp.2007.366226

Google Scholar

[3] W.Dai, Text Steganography System Using Markov Chain Source Model and DES Algorithm. In: JOURNAL OF SOFTWARE, VOL. 5, and NO. 7, JULY 2010 785.

DOI: 10.4304/jsw.5.7.785-792

Google Scholar

[4] Spyridon K. Kapotas, Eleni E. Varsaki and Athanassios N. Skodras, Data Hiding in H.264 Encoded Video Sequences. In: IEEE International Conference on Multimedia Signal Processing, 2007.

DOI: 10.1109/mmsp.2007.4412894

Google Scholar

[5] Anil Kumar and Navin Rajpal, Application of T-Code, Turbo Codes and Pseudo-Random Sequence for Steganography, Journal of Computer Science 2 (2): 148-153, 2006.

DOI: 10.3844/jcssp.2006.148.153

Google Scholar

[6] C.M. Wang, N.I.W, C.S. Tsai, M.S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function. In: The Journal of Systems and Software 2007 Elsevier.

DOI: 10.1016/j.jss.2007.01.049

Google Scholar

[7] C.Ming Wang , N.Wu, C.S. Tsai, Min-Shiang Hwang, A high quality steganographic method with pixel-value differencing and modulus function. In: The Journal of Systems and Software Elsevier Inc, 2007.

DOI: 10.1016/j.jss.2007.01.049

Google Scholar

[8] C.C. Chang, T.S. Chen, L.Z. Chung, A steganographic method based upon JPEG and quantization table modification, Information Sciences .141 (2002) 123–138.

DOI: 10.1016/s0020-0255(01)00194-3

Google Scholar

[9] C.C. Chang , H.W. Tseng, A steganographic method for digital images using side match. In: Pattern Recognition Letters 25 (2004) 1431–1437.

DOI: 10.1016/j.patrec.2004.05.006

Google Scholar

[10] D.C.Wu , W.H. Tsai, A steganographic method for images by pixel-value differencing. In: Pattern Recognition Letters 24 (2003) 1613–1626.

DOI: 10.1016/s0167-8655(02)00402-6

Google Scholar

[11] K. Satish, T. Jayakar, Charles Tobin, K. Madhavi and K. Murali, Chaos Based Spread Spectrum Image Steganography. IEEE Transactions on Consumer 588 Electronics, Vol. 50, No. 2, MAY 2004.

DOI: 10.1109/tce.2004.1309431

Google Scholar

[12] B.M. Rodriguez and G.L. Peterson, Multi-Class Classification Fusion using boosting for Identifying steganography Methods. In: SPIE Multisource Information Fusion: Architectures, Algorithms, and Applications March 17, 2008.

DOI: 10.1117/12.777328

Google Scholar

[13] C.Chang, H.T.seng, A steganographic method for digital images using side match. In: Pattern Recognition Letters 25 (2004) 1431–1437.

DOI: 10.1016/j.patrec.2004.05.006

Google Scholar

[14] D.C.Wu, W.H. Tsai, A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 (2003) 1613–1626.

DOI: 10.1016/s0167-8655(02)00402-6

Google Scholar

[15] K. Satish, T. Jayakar, Charles Tobin, K. Madhavi and K. Murali, Chaos Based Spread Spectrum Image Steganography. In: IEEE Transactions on Consumer 588 Electronics, Vol. 50, No. 2, MAY 2004.

DOI: 10.1109/tce.2004.1309431

Google Scholar