Open Access Open Access  Restricted Access Subscription or Fee Access

Steganography: See the Unseen

Pankaj Sharma, Onkar Singh

Abstract


Steganography is the method of transferring private information and data through open network communication, so only the receiver who has the secret key can read the secret messages which might be documents, phone conversations, images or other forms of data. In this paper, we have analyzed and implemented the art of steganography that how it works practically with the help of Matlab. In this way, a clear view of steganography method can be understood.

Keywords


Cover Image, Payload, Stego-Key

Full Text:

PDF

References


Jain Ankit, Steganography: A solution for data hiding. Department of Computer Science and Engineering, Guru Nanak Dev Engineering College, Ludhiana, 2007.

T. Morkel, J.H.P. Eloff, M.S. Olivier, AN OVERVIEW OF IMAGE STEGANOGRAPHY. ICSA Research Group, Department of Computer Science, University of Pretoria, 0002, Pretoria, South Africa, 2005.

Shawn D. Dickman, An Overview of Steganography. Department of Computer Science, James Madison University Infosec Techreport, 2007.

Nicholas J. Hopper, Toward a theory of Steganography. School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, 2004.

Christian Cachin, Digital Steganography. IBM Research, Zurich Research Laboratory, CH-8803 Ruschlikon, Switzerland, 2005.

Professor Kevin O‟Bryant, Principles of Steganography. Math 187: Introduction to Cryptography, Max Weiss, 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.