International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 1 | Issue 3 | Year 2011 | Article Id. IJPTT-V1I3P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I3P401

Relative Antropy Based Analysis of Image Steganography Techniques


Kamaldeep

Citation :

Kamaldeep, "Relative Antropy Based Analysis of Image Steganography Techniques," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 3, pp. 1-4, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I3P401

Abstract

Steganography is the art and science of hiding the data within some cover media like image file, audio file, video file, text file etc. in such a manner that no one apart from the sender and receiver can determine the existence of the message in the cover file. Images are very common cover files that are transmitted over the internet. They can carry large amount of information. In image steganography, we choose image as a cover file for insertion of the message. In this paper, we analyze some existing techniques of image steganography on the basis of relative entropy metric.

Keywords

Data Hiding, Steganography, Image etc.

References

[1] N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26-34, February 1998.
[2] D. Kahn, The Codebreakers, Macmillian, New York, 1967.
[3] B. Norman, Secret Warfare, Acropolis Books, Washington D.C., 1973.
[4] Amirtharajan Rengarajan, Ganesan Vivek, Jithamanyu R, Rayappan John Bosco Balaguru, “An Invisible Communication for Secret Sharing against Transmission Error”, Universal Journal of Computer Science & Engineering Technology, 1 (2), 117-121, Nov – 2010.
[5] Simmons G. J, “The Prisoners Problem and the Subliminal Channel”, Proceedings of crypto ‟83, Plenum Press, pp 51-67, 1983.
[6] Anderson R. J, “Stretching the Limit of Steganography”, In Information Hiding, Springer Lecture Notes in Computer Science, Vol. 1174, pp 39-48, 1996. [7] Anderson R. J, Peticolas FAP, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16 No 4, pp 474-481, May 1998.
[8] NEIL F. JOHNSON, ZORAN DURIC, S. G. J. Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1). Kluwer Academic Publishers, February 15, 2001.
[9] R.Amirtharajan, R. Akila, P.Deepikachowdavarapu, “A Comparative Analysis of Image Steganography”. International Journal of Computer Applications 2(3):(2010)41–47.
[10] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752.
[11] W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
[12] Peter Wayner, “Disappearing cryptography: information hiding : steganography & watermarking” 2nd. ed. San Francisco: Morgan Kaufmann; 2002. [13] R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5)(2010) 11–18.
[14] S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000. [15] Neil F Johnson, Sushil Jajodia, “Exploring Stenography: Seeing the Unseen”, IEEE Computer, Feb 1998, pp 26-34.
[16] Yadav, Rajkumar, Rishi, Rahul, Batra, Sudhir, “A new Steganography Method for Gray Level Images using Parity Checker”, International Journal of Computer Applications (0975-8887) Volume 11-No. 11, December 2010.
[17] Yang, C.H. (2008), “ Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition 41, 2674–2683.
[18] Batra Sudhir, Rishi Rahul, Yadav Rajkumar, “Insertion of message in 6th, 7th & 8th bit of pixel values and retrieval in case intruder changes the least significant bit of image pixels”, International Journal of Security and its Applications, Vol . 4, No. 3, July 2010.