Security through Steganography - A Survey
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 12, December 2019

Security through Steganography - A Survey

Manu Narula, Chahat Goyal, Nikhil Sinha

In todays world, digitization has become a popular concept. However, it has also led to vast new ways of compromising privacy and accessing sensitive information giving rise to the need for high standard security in this field. Three major players surfaced in response to this problem; Cryptography, Water marking and Steganography. Steganography hides information in visual actions or media such as hand signs, visual Morse code, image pixels or frame pixels for streamed flow like videos, making it invisible to a wide variety of attacks as well as simple visual detection from humans making it almost impenetrable layer of security. Here we will be discussing the very roots of emergence of Steganography, their importance at their inception as well as their role in shaping the modern day landscape for data hiding schemes, along with the modern take and techniques in persuasion today.

Keywords: Steganography, Transform Domain, Spatial Domain, LSB, Quantization, Histogram

Edition: Volume 8 Issue 12, December 2019

Pages: 1796 - 1803

Share this Article

How to Cite this Article?

Manu Narula, Chahat Goyal, Nikhil Sinha, "Security through Steganography - A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20203700, Volume 8 Issue 12, December 2019, 1796 - 1803

80 PDF Views | 57 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Review Papers, Computer Science & Engineering, Jordan, Volume 7 Issue 6, June 2018

Pages: 1713 - 1715

Steganography and Watermarking: Review

Mohammed Salem Atoum

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

Similar Articles with Keyword 'Transform Domain'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1624 - 1629

Video Watermarking Based On DWT-SVD Techniques

Rini T Paul

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 1796 - 1803

Security through Steganography - A Survey

Manu Narula, Chahat Goyal, Nikhil Sinha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1879 - 1886

DWT-PCA Based Image Fusion Using GPU

Vengayil Nayana Murali, Rahul C

Share this Article

Similar Articles with Keyword 'Spatial Domain'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1172 - 1174

Survey on Digital Watermarking

Jyoti, Jyoti Rani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1134 - 1138

An Approach towards Improved Hyperspectral Image Denoising

Nilima A. Bandane, Deeksha Bhardwaj

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 2, February 2015

Pages: 588 - 591

Suitable Data Hiding Technique for Windows Phone

Zainalabideen Abdual Samad Rasheed

Share this Article

Similar Articles with Keyword 'LSB'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1132 - 1134

An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption

Ayda Alizadeharasi, Maryam Safaei Rizi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 190 - 193

Data Embedding Method Using Video Pixel Pair Technique

Saleena Thongam, Manjima R.L

Share this Article

Similar Articles with Keyword 'Quantization'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 837 - 841

Fetal ECG Signal Optimization on Signal Obtained From FECG Sensor for Remote Areas with Lower Signal Strength for Its Smooth Propagation to Medical Databases

Sheena Chaudhary, Rupinder Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1232 - 1237

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

Nivi Varghese, Charlse M Varghese

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1373 - 1377

Symbolic Representation of Speech for Text Independent Speaker Recognition

Akshay S, Apoorva P

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2599 - 2603

Iris Image Classification: A Survey

Anjali Hake, Pradeep Patil

Share this Article

Similar Articles with Keyword 'Histogram'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1731 - 1734

A Survey on Multimodal Visual Search Methods

Seema Ranuji Ghule

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 762 - 767

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 584 - 586

A Review on Histogram Shifting for Reversible Watermarking Technique

Naina Gaharwar, Dr. Reena Gunjan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2472 - 2475

Mining Interaction Patterns among Brain Regions by Clustering Based Interactive K-Means

Amruta S. Chougule, S. A. Bajpai

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1841 - 1844

A Data Mining Approach to Detect Tuberculosis Using Clustering and GA-NN Techniques

Shakshi Garg, Navpreet Rupal

Share this Article
Top