2014 International Conference on Computing for Sustainable Global Development (INDIACom) 2014
DOI: 10.1109/indiacom.2014.6828087
|View full text |Cite
|
Sign up to set email alerts
|

Steganography and classification of image steganography techniques

Abstract: Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the cofidential information in a secure way. It… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 57 publications
(23 citation statements)
references
References 21 publications
0
22
0
1
Order By: Relevance
“…The altered new object is called stego-object. Image, audio, video and so on can be the cover objects [28,29,30]. For steganography algorithms, three concepts are required that contend with each other [31]:…”
Section: Steganographymentioning
confidence: 99%
“…The altered new object is called stego-object. Image, audio, video and so on can be the cover objects [28,29,30]. For steganography algorithms, three concepts are required that contend with each other [31]:…”
Section: Steganographymentioning
confidence: 99%
“…Additionally, the easiest and simplest way to detect or suspect the existence of steganography is by using the natural eye [12]. Experts in steganalysis observe the presence of steganography when each bit of pixels is altered [13].…”
Section: B the Steganography Detection Techniquesmentioning
confidence: 99%
“…JPEG compression has two levels: first DCT quantization, which forms the part of the lossy level and the second one, is the Huffman coding that compresses data lossless. JPEG image embedding stores secret data between these two phases [4]. DCT transformed cosine values cannot be calculated back exactly and repeated calculation using limited precision number produces a rounding error hence, it is called lossy compression.…”
Section: Related Workmentioning
confidence: 99%