Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 30455


Select areas to restrict search in scientific publication database:
10005613
An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.
Digital Object Identifier (DOI):

References:

[1] H. Gharsellaoui, M. Khalgui, S. Ben Ahmed. Preemptive Hard Real-time Scheduling of Reconfigurable OS Tasks on Multiprocessors Embedded Control Systems. PECCS - Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems, 192–197, Lisbon, Portugal, 7-9 January, 2014.
[2] H. Kekre, A. Athawale, T. Sarode, S. Thepade and K. Sagvekar. Steganography Using Dictionary Sort on Vector Quantized Codebook. International Journal of Computer Science and Security (IJCSS), vol. 4, no. 4, pp. 392–402, 2010.
[3] V. Michopoulos, L. Guan, G. Oikonomou, I. Phillips. DCCC6: Duty Cycle-aware congestion control for 6LoWPAN networks. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 278–283, 2012.
[4] D. Stinson. Cryptography: Theory and Practice. 2nd Edition, Chapman and Hall, CRC, 2002.
[5] N. Johnson and S. Jajodia. Steganalysis of Images Created using Current Steganography Software. Lecture Notes in Computer Science, vol. 1525, pp. 32–47, Springer Verlag, 1998.
[6] J. Fridrich, M. Goljan, D. Hogea and D. Soukal. Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length. ACM Multimedia Systems Journal, Special issue on Multimedia Security, vol. 9, no. 3, pp. 288–302, 2003.
[7] A. Westfeld and A. Pfitzmann. Attacks on Steganographic Systems. Proceedings of the 3rd International Workshop on Information Hiding, pp. 61–76, 1999.
[8] S. Dumitrescu, X. Wu and N. Memon. On Steganalysis of Random LSB Embedding in Continuous tone Images. Proceedings of the International Conference on Image Processing, vol. 3, pp. 641– 644, June 2002.
[9] J. Fridrich and M. Long. Steganalysis of LSB Encoding in Color Images. Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), vol. 3, pp. 1279–1282, New York, NY, USA, July August 2000.
[10] A. Westfeld. F5 A Steganographic Algorithm. Lecture Notes in Computer Science, vol. 2137, pp. 289–302, January 2001.
[11] I. Avcibas, N. Memon and B. Sankur. Steganalysis using Image Quality Metrics. IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221–229, February 2003.
[12] I. Avcibas, N. Memon and B. Sankur. Image Steganalysis with Binary Similarity Measures. Proceedings of the IEEE International Conference on Image Processing, vol. 3, pp. 645–648, June 2002.
[13] N. Champakamala, K. Padmini, D.K. Radhika. Least Significant Bit algorithm for image steganography. International Journal of Advance Computer Technology, vol(3), N. 4, pages 34–38, 2013.
[14] N. Meghanathan and L. Nayak. Steganalysis Algorithms For Detecting The Hidden Information In Image, Audio And Video Cover Media. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, pp. 43–55, 2010.
Vol:14 No:05 2020Vol:14 No:04 2020Vol:14 No:03 2020Vol:14 No:02 2020Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007