Research Article | Open Access | Download PDF
Volume 1 | Issue 3 | Year 2011 | Article Id. IJPTT-V1I3P401 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I3P401Relative Antropy Based Analysis of Image Steganography Techniques
Kamaldeep
Citation :
Kamaldeep, "Relative Antropy Based Analysis of Image Steganography Techniques," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 3, pp. 1-4, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I3P401
Abstract
Steganography is the art and science of hiding
the data within some cover media like image file, audio file, video file, text
file etc. in such a manner that no one apart from the sender and receiver can
determine the existence of the message in the cover file. Images are very
common cover files that are transmitted over the internet. They can carry large
amount of information. In image steganography, we choose image as a cover file
for insertion of the message. In this paper, we analyze some existing techniques
of image steganography on the basis of relative entropy metric.
Keywords
Data Hiding, Steganography, Image etc.
References
[1] N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26-34, February 1998.
[2] D. Kahn, The Codebreakers, Macmillian, New York, 1967.
[3] B. Norman, Secret Warfare, Acropolis Books, Washington D.C., 1973.
[4] Amirtharajan Rengarajan, Ganesan Vivek, Jithamanyu R, Rayappan John Bosco Balaguru, “An Invisible Communication for Secret Sharing against Transmission Error”, Universal Journal of Computer Science & Engineering Technology, 1 (2), 117-121, Nov – 2010.
[5] Simmons G. J, “The Prisoners Problem and the Subliminal Channel”, Proceedings of crypto ‟83, Plenum Press, pp 51-67, 1983.
[6] Anderson R. J, “Stretching the Limit of Steganography”, In Information Hiding, Springer Lecture Notes in Computer Science, Vol. 1174, pp 39-48, 1996. [7] Anderson R. J, Peticolas FAP, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16 No 4, pp 474-481, May 1998.
[8] NEIL F. JOHNSON, ZORAN DURIC, S. G. J. Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1). Kluwer Academic Publishers, February 15, 2001.
[9] R.Amirtharajan, R. Akila, P.Deepikachowdavarapu, “A Comparative Analysis of Image Steganography”. International Journal of Computer Applications 2(3):(2010)41–47.
[10] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752.
[11] W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
[12] Peter Wayner, “Disappearing cryptography: information hiding : steganography & watermarking” 2nd. ed. San Francisco: Morgan Kaufmann; 2002. [13] R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5)(2010) 11–18.
[14] S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000. [15] Neil F Johnson, Sushil Jajodia, “Exploring Stenography: Seeing the Unseen”, IEEE Computer, Feb 1998, pp 26-34.
[16] Yadav, Rajkumar, Rishi, Rahul, Batra, Sudhir, “A new Steganography Method for Gray Level Images using Parity Checker”, International Journal of Computer Applications (0975-8887) Volume 11-No. 11, December 2010.
[17] Yang, C.H. (2008), “ Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition 41, 2674–2683.
[18] Batra Sudhir, Rishi Rahul, Yadav Rajkumar, “Insertion of message in 6th, 7th & 8th bit of pixel values and retrieval in case intruder changes the least significant bit of image pixels”, International Journal of Security and its Applications, Vol . 4, No. 3, July 2010.