Have a personal or library account? Click to login
Design and Implementation Steganography System by using Visible Image Cover

Design and Implementation Steganography System by using Visible Image

Open Access
|Jun 2015

References

  1. Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir Memon” Image Steganography and Steganalysis: Concepts and Practice” Second International Workshop, Seoul, Korea, Revised Papers, Volume 2939, pp 35-49, 2004.10.1007/978-3-540-24624-4_3
  2. Jitendra Jain, Punit Johari” Digital Image Watermarking Based on LSB for Gray Scale Image” IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.6,pp. 108-112, June 2014.
  3. Firas A. Jassim” Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method” International Journal of Computer Applications (0975 – 8887) Volume 72– No.17, pp. 39-44, June 2013.
  4. Mehdi Hussain and Mureed Hussain” A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54, pp 113-124, May 2013.
  5. F. Alturki and R. Mersereau,”Secure blind image steganographic technique using discrete fourier transformation ,” IEEE International Conference on Image Processing, Thessaloniki, Greece., vol.2, 542 – 545, 2001.
  6. N. Provos, “Probabilistic Methods for Improving Information Hiding”, CITI Technical Report 01-1, pp. 1-8, January, 2001.
  7. R A Isbell, “Steganography: Hidden Menace or Hidden Saviour”, Steganography White Paper, 10 May 2002.
  8. Alisha Arora, Mrs. Nirvair Neeru, Mrs. Taqdir”IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW” International Journal For Technological Research In Engineering Volume 1, Issue 9,pp.924-929, May-2014.
  9. Kuanchin Chen “Digital Watermarking and Steganography” Western Michigan University, USA 2009, IGI Global.
  10. Provos, N.& Honeyman, P. “Hide and Seek: An introduction to steganography”, IEEE Security and Privacy Journal, vol 1, Issue 3 , pp 32 – 44, 2003.10.1109/MSECP.2003.1203220
  11. Fridrich. J., Lukas J. and Goljan M., “Digital Camera Identification from Sensor Noise”,IEEE Transactions on Information Security and Forensics, vol 1(2), pp 205-214, 2006.10.1109/TIFS.2006.873602
  12. N. Provos, “Defending Against Statistical Steganalysis,” In Proceedings of USENIX Security Symposium, pp. 323–335, 2001.
  13. Ajinkya Kawale, Shubham Gaidhani”Digital Image Watermarking”International Journal of Scientific& Engineering Research, Volume 4, Issue 5, pp. 1899-1901, 2013.
  14. Yusuf Perwej, Firoj Parwej , Asif Perwej”An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”, The International Journal of Multimedia& Its Applications (IJMA) Vol.4, No.2, pp. 21-38, 2012.10.5121/ijma.2012.4202
  15. Wang R.Z. , Lin C.F. , Lin J.C. “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition, vol 34 , no 3 , pp 671 – 683, 2001.10.1016/S0031-3203(00)00015-7
  16. Puneet Kr Sharma and Rajni” ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM” International Journal of Information Sciences and Techniques (IJIST) Vol. 2, No.4, pp. 95-101, July 2012.10.5121/ijist.2012.2409
  17. Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S., Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom, Submitted for the Degree of Master of Science in Security Technologies& Applications 2008.
  18. R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp.671-683, Mar. 2001.10.1016/S0031-3203(00)00015-7
  19. A. Westfeld. “F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.10.1007/3-540-45496-9_21
  20. S.C.Mukhopadhyay, F.P.Dawson, M.Iwahara and S.Yamada, “A Novel Compact Magnetic Current Limiter for Three Phase Applications”, IEEE Transactions on Magnetics, Vol. 36, No. 5, pp. 3568-3570, September 2000.
  21. S. Yamada, K. Chomsuwan, S.C.Mukhopadhyay, M.Iwahara, M. Kakikawa and I. Nagano, “Detection of Magnetic Fluid Volume Density with a GMR Sensor”, Journal of Magnetics Society of Japan, Vol. 31, No. 2, pp. 44-47, 2007.10.3379/jmsjmag.31.44
  22. Anju Thomas, D. Sugumar, P.T Vanathi” Blind Image Source Separation based on MMCA using Dictionary Technique” International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 2, Issue 2,pp.182-186, 2013.
  23. Amrita Khamrui, J K Mandal” A Genetic Algorithm based Steganography using Discrete
  24. Cosine Transformation (GASDCT)” International Conference on Computational Intelligence:Modeling Techniques and Applications(CIMTA),Volume 10, Pages 105–111 2013.10.1016/j.protcy.2013.12.342
  25. Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, “Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm” International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp.458-462, 2012.10.7763/IJCEE.2012.V4.533
  26. Hamdan L. Jaheel and Zou Beiji,A novel approach of combining steganography algorithms,International Journal on Smart Sensing and Intelligent Systems, vol.8, no.1, pp.90-106, 2015.10.21307/ijssis-2017-750
  27. Wang Tao, Design of digital image encryption algorithm based on mixed chaotic sequences, International Journal on Smart Sensing and Intelligent Systems, vol.7, no.4, pp. 1453 – 1469, 2014.
Language: English
Page range: 1011 - 1030
Submitted on: Feb 2, 2015
Accepted on: Mar 30, 2015
Published on: Jun 1, 2015
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2015 HamdanLateef Jaheel, Zou Beiji, Ahmed Lteef Jaheel, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.