Professional Documents
Culture Documents
Review - Image Steganography
Review - Image Steganography
322
Manmohan Sharma
Assistant Professor
Department of Computer Science &. Engg
LPU, Jalandhar (Pb)-India
ABSTRACT
This Paper provides a review on the steganography,
Image Steganography. Steganography is able to hide the
top secret information into the object, object can be
considered as text, image, audio, and video.
Steganography is used for protection of the
communicating messages transmitted over the network
between two persons. For the image steganography we
can obtain the success by inserting the content into the
cover information. In this paper we analysis the features,
application, image steganography with related work.
Keywords Steganography,
Image Steganography, Encryption
I.
4.
Cryptography,
INTRODUCTION
Over the past years, we see the rapid increase in the use
of internet for transmitting the information to another
person without unauthorized access. This can be attained
by steganography only. We can embed the covert
information to the cover information. Steganography
found by two different words stego and grafia which
means covered writing.
The similarity between steganography and cryptography
is, together they are used to cover up important
Information. But the difference is that the steganography
does not reveal any suspicious about the hidden secret
message to the customer. Therefore the assailant will not
struggle to decrypt secret information. This Paper
reviews the various methods of steganography such as
image, audio, video, text, to mask the Information.
Cryptography deals message encryption but the
communication is visible.
Various features characterize the strengths and
weaknesses of the methods.
1. Hiding Capacity: Hiding capacity is the amount of
messages that can be invisible virtualized to the
amount of the wrapper message. A well-built hiding
capacity permits the utilization of a smaller wrapper
for the message of permanent amount ensuing in
diminishing of the bandwidth necessary to
broadcast the stego-image.
II.
APPLICATIONS
STEGANOGRAPHY
OF
III.
IMAGE STEGANOGRAPHY
www.ijaert.org
Cover image
O
Secret
message S
Obtain Stego
information
Figure1: Steganographic Model
For extracting the information at the receiver side we
will follow the reverse process for the system foe
embedding the information. Again by using the
steganographic algorithm secret message S is extracted.
IV.
RELATED WORK
V.
323
CONCLUSION
WORK
AND
FUTURE
REFERENCES
[1] Jasleen Kour, Deepankar Verma, Steganography
Techniques A Review Paper, International Journal of
Emerging Research in Management &Technology ISSN:
2278-9359 (Volume-3, Issue-5)
[2] Rakhi1, Suresh Gawande, A REVIEW ON
STEGANOGRAPHY
METHODS,
International
Journal of Advanced Research in Electrical, Electronics
and Instrumentation Engineering (An ISO 3297: 2007
Certified Organization) Vol. 2, Issue 10, October 2013
[3] Shilpa Thakar, Monika Aggarwal, A Review
Steganography, International Journal of Advanced
www.ijaert.org
324
www.ijaert.org