Novel Approach for Hiding Secret Data in Image Using Cryptic Steganography
Abstract
Keywords
Full Text:
PDFReferences
Alain C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East CarolinaUniversity,http://www.infosecwriters.com/text_resources/pdf/steganographyDTEC6823.pdf
Niels Provos, Peter Honeyman, Hide and Seek: Introduction to Steganography, IEEE Security and Privacy, Volume 1 , Issue 3 (May 2003).
Jessica Fridrich and Miroslav Goljan, Digital image steganography using stochastic modulation, Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY, USA.
Swarnendu Mukherjee & Bhattacharya, Amlan Chaudhury Triple Layer Data Security ACM Ubiquity, Volume 9, Issue 17, 2008.
William Stalling, “Cryptography and Network Security-Principles and Practices”, fourth edition, Pearson Prentice Hall pf India P.Ltd.
Hempstalk, K.: Hiding behind corners: using edges in images for better steganography. Computing Womens Congress Conference, Hamilton, New Zealand, 2006.
Fridrich, J., Goljan, M. and Du, R.: Reliable detection of LSB steganography in color and grayscale images. Proc. ACM Workshop on Multimedia and Security, Ottawa, ON, Canada.
C.C. Chang, M.H. Lin, and Y.C. Hu, “A fast and secure image hiding scheme based on LSB substitution,” International J. of Pattern Recognition and AI, vol.16, no.4, 2002.
Van Dijk, M. and Willems, Embedding information in grayscale images. Proc. 22nd Symposium on Information and Communication Theory in the Benelux, pp. 147-154, Enschede, The Netherlands, May 15-16, 2001.
Goljan, M. and Holotyak, T.: New blind steganalysis and its implications. Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-13, 2006.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.