A Study and Review of Techniques of Spatial Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 114

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Steganography is the technique of hiding secret information within any media like text, images, audio/video and protocol based network. This paper studies and reviews various data hiding techniques based on spatial domain image steganography like Least Significant Bit, Most Significant Bit, Parity check, Pixel value differencing. It elaborates an overview of steganography and illustrates the process of steganography. Various classifications of steganographic techniques are discussed. The image domain/ spatial domain techniques are discussed in detail. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of digital steganography technology and its implications. Equally important are the ethical concerns of using steganography and steganalysis. Steganography enhances rather than replaces encryption.

Keywords: Data hiding, Steganography, Cover-media, Cover-object, Stego-image, Stego-key

Edition: Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

Share this Article

How to Cite this Article?

Ravneet Kaur, Bhavneet Kaur, "A Study and Review of Techniques of Spatial Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=27041501, Volume 4 Issue 4, April 2015, 3198 - 3203

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Data hiding'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Similar Articles with Keyword 'Steganography'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Similar Articles with Keyword 'Cover-object'

Downloads: 114

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Downloads: 129

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this Article

Similar Articles with Keyword 'Stego-image'

Downloads: 114

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Downloads: 120

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

Share this Article

Downloads: 124 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 79 - 82

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa, S. Rani Lakshmi

Share this Article

Downloads: 137

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 173 - 176

Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing

P. Sujitha, G. Murali

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Informative Article, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 372 - 376

Image Steganography using DWT and Data Encryption Standard (DES)

Ketan Shah, Swati Kaul, Manoj S.Dhande

Share this Article

Similar Articles with Keyword 'Stego-key'

Downloads: 114

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Downloads: 136

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 670 - 672

A Comparative Study of Steganography & Cryptography

Pranali R. Ekatpure, Rutuja N Benkar

Share this Article

Downloads: 152

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 293 - 297

A Comparative Study of Image Steganography Techniques

Shivani Kundra, Nishi Madaan

Share this Article



Top