Security through Steganography - A Survey
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 124 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 12, December 2019

Security through Steganography - A Survey

Manu Narula, Chahat Goyal, Nikhil Sinha

In todays world, digitization has become a popular concept. However, it has also led to vast new ways of compromising privacy and accessing sensitive information giving rise to the need for high standard security in this field. Three major players surfaced in response to this problem; Cryptography, Water marking and Steganography. Steganography hides information in visual actions or media such as hand signs, visual Morse code, image pixels or frame pixels for streamed flow like videos, making it invisible to a wide variety of attacks as well as simple visual detection from humans making it almost impenetrable layer of security. Here we will be discussing the very roots of emergence of Steganography, their importance at their inception as well as their role in shaping the modern day landscape for data hiding schemes, along with the modern take and techniques in persuasion today.

Keywords: Steganography, Transform Domain, Spatial Domain, LSB, Quantization, Histogram

Edition: Volume 8 Issue 12, December 2019

Pages: 1796 - 1803

Share this Article

How to Cite this Article?

Manu Narula, Chahat Goyal, Nikhil Sinha, "Security through Steganography - A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20203700, Volume 8 Issue 12, December 2019, 1796 - 1803

Enter Your Email Address




Similar Articles with Keyword 'Steganography'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Similar Articles with Keyword 'Transform Domain'

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this Article

Downloads: 120 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 70 - 73

Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images

Hina Anand, Kapil Narwal, Kartik Mudgal

Share this Article

Downloads: 120 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1624 - 1629

Video Watermarking Based On DWT-SVD Techniques

Rini T Paul

Share this Article

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1879 - 1886

DWT-PCA Based Image Fusion Using GPU

Vengayil Nayana Murali, Rahul C

Share this Article

Similar Articles with Keyword 'Spatial Domain'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1172 - 1174

Survey on Digital Watermarking

Jyoti, Jyoti Rani

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1168 - 1171

An Advanced Implementation for Enhancing Color Images Using Histogram Technique

Anubhooti Purbey, Manish Mathuria

Share this Article

Similar Articles with Keyword 'LSB'

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Downloads: 108 | Monthly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Similar Articles with Keyword 'Quantization'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 837 - 841

Fetal ECG Signal Optimization on Signal Obtained From FECG Sensor for Remote Areas with Lower Signal Strength for Its Smooth Propagation to Medical Databases

Sheena Chaudhary, Rupinder Kaur

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1232 - 1237

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

Nivi Varghese, Charlse M Varghese

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1536 - 1539

Research on Joint Watermarking & Lossless Compression for Image

Bharti Verma, Somesh Dewangan, Sachin Harne

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1373 - 1377

Symbolic Representation of Speech for Text Independent Speaker Recognition

Akshay S, Apoorva P

Share this Article

Similar Articles with Keyword 'Histogram'

Downloads: 34

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1019 - 1020

Survey on Cancer Detection using Content Based Image Retrieval Technique

Aparna W. Bondade, Priti Saktel

Share this Article

Downloads: 107 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1347 - 1354

Human Detection with Non Linear Classification Using Linear SVM

Vaibhav Janbandhu

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1915 - 1919

Optimized Content Based Image Retrieval System using Colored Features with IWD

Damandeep Singh, Nitin Bhagat

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1891 - 1895

Image Normalization Robust using Histogram Equalization and Logarithm Transform Frequency DCT Coefficients for Illumination in Facial Images

Dr. V. S. Manjula

Share this Article



Top