Open Access Open Access  Restricted Access Subscription or Fee Access

A Narrative Loom to Secured Strewn Assorted Milieu in Network Architecture

P. Visu, E. Kannan, S. Koteeswaran, N. Pughazendi


Service oriented steganography is a framework based on, on which a logical transparent steganographic layer development. In this paper the works on steganography and its approach is studied and divided on Work Breakdown Structure into simple rational services allotted to network infrastructure. Service oriented architecture is also described which service oriented architecture communicates each and everything through a common language to desired compositions. It also reuses, outsource, maintain and make simple and available all the system attributes. In addition to this a related ADL model in the form of framework is also developed to describe and clarify the above proposed approach of steganographic algorithms which can be supported by different services on the network. This service based steganography system implements encoding service to hide a secret image inside a cover image automated by cover image selection service and decoding service which performs the extraction process. 


Service Oriented Architecture, Slightest Momentus Crub Inclusion, Application Programming Interfaces, Granular and Distributed Service Oriented Systems.

Full Text:



D. Alberts, R. Hayes, “Power to the edge: command and control in the information age,” Command and control Res. Prog. , 2003.

M. E. Steenstrup, Routing in Communication Networks, Prentice- Hall, 1st edition, 1995.

M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, M. Z. I. Shamsuddin, “Information Hiding using Steganography,” Proc. 4th National Conf. on Telecommunication Technology, shah Alam, Malaysia, Jan. 2003, pp. 21-25.

H. J. Beker, F. C. Piper, “Communication Security. A Survey of Cryptography,” IEE Pro., Communications, Radar, and Signal Proccessing, vol. 129, no. 6, pp. 357-376, Aug. 1982, doi: 10.1049/ipf-1:19820057

N. Provos, P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security ans Privacy Journal, pp. 32-44, May- June 2003, doi: 10.1109/MSECP.2003.1203220.

[6] B. Chen, G. Wornell, “Quantization Index Modulation: A Class of Provabily Good Methods for Digital Watermarking and Information Embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 563-593, Mar. 2003, doi: 10.1109/18.923725.

G. Mastronardi, M. Castellano, F. Marino, “Steganography Effects in Various Formats of Images. A Preliminary Study,” Proc. Intr. Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, July 2001, pp. 116-119, doi: 10.1109/IDAACS.2001.941993.

M. Shirali-Shahreza, “A New Method for Real-Time Steganography,” Proc. 8th Int. Con. Signal Processing, vol. 4, 2006, pp. 16-20, doi: 10.1109/ICOSP.2006.345954.

M. Shirali-Shahreza, M. H. Shirali-Shahreza, “Text Steganography in SMS,” Proc. Int. Conf. Convergence Information Technology (ICCIT07), Gyeongju, Korea, Nov. 2007, pp. 2260-2265, doi: 10.1109/ICCIT.2007.100

D. Artz, “Digital Steganography: Hiding Data within Data” IEEE Internet Computing, vol. 5, no. 3, May 2001, pp. 75-80, doi: 10.1109/4236.935180.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.