Image Steganography Review

1470 Words3 Pages

IMAGE STEGANOGRAPHY REVIEW

1. INTRODUCTION

With the rapid development of computer technologies and internet, one can get any information through internet very easily. To transfer or convey a message from one point to another is also very convenient in today’s era. People who have internet and computer can get any type of information related to any field without any difficulty [1]. While transferring or communicating on internet safety and security remains an issue. Steganography schemes are used to get rid of these type of safety and security issues. The standard phrase “What You See Is What You Get (WYSIWYG)” is not true if the misuse or hacking is there. One can transfer secret information through internet using Steganography schemes very easily.

1.1 Nomenclature

Steganography is the word derived from a Greek word Steganos, which means, “Covered ” and graphy means “writing”. Steganography is a technique which is used to hide data in such a manner that the existence of hidden data is unknown. The original files can be referred to as cover text, cover image, or cover audio. Medium through which the information is hidden is Stego Medium. Steganalysis is the identifying the existence of the message.

1.2 Origin of Steganography

The origin of steganography was by Greeks in 500 B.C. They use slaves as a medium to send the hidden message. The slave’s head was shaved and the secret message is tattooed on the skull, after which hairs are allowed to regrow. The slave is then send to the destination who shave the slaves’ head and read the hidden message. This method is not time dependent. Then next strategies used by Greeks are stuffed rabbits and wax tables. In the middle ages i.e. 1400-1600 A.D., the concept of Biliteral ciphe...

... middle of paper ...

...chniques”, ASEE Northeast Section Conference

[2]. Streetman Kibbee D.,------,”Steganography Art of Covert Communication”----------

[3]. Ashok Jammi, Raju Y., S.Munishankaraiah, K.Srinivas, 2010, “Steganography:An Overview”, International Jornal of Engineering Science and Technology, Vol. 2, No.10,pp. 5985-5992.

[4]. Wu Hsien-Chu, Wang Hua-Cheng, Tsai Chwei-Shyong, Wang Chung-Ming, 2010, “Reversible Image Steganographic Scheme Via Predictive Coding” ,Displays Elsevier, Vol. 31, No. 1, pp. 35-43.

[5]. Chugh Gunjan,2013,”Image Steganography Techniques: A Review Article”, ACTA technical corviniensis-Bulletin of Engineering, Vol. 6,No. 3, pp.97-104.

[6]. Joshi Saurabh V., Bakil Ajinkya A., Jain Nikhil A., Koshti Deepali,2012,”Image Steganography Combination of Spatial and Frequency Domain”,International Journal of Computer Applications, Vol. 53, No. 5, pp. 25-29.

More about Image Steganography Review

Open Document