Survey and Analysis of Various Steganographic Techniques
نویسنده
چکیده
Steganography is a method of secret communication that hides the existence of hidden message. The hidden message can be text, image, audio, video, etc. The innocent files can be a cover image after inserting the message into the cover image using stego-key, it is reffered to as stego-image. Steganography becomes more important due to the exponential growth and secret communication of potential computer users on the internet. Steganography is different from cryptography in the way that cryptography hides the contents of secret message where as steganography is about hiding the message. In this paper various steganographic techniques have been analyzed. This paper also gives an overview of steganography, its applications, how it is different from cryptography and different methods of steganography.
منابع مشابه
Survey on Information Hiding Techniques and Analysis of Quality Assessment Parameters
Due to the increasing demand of various internet applications such as voice over IP (VOIP), audio conferencing etc. it is required that the data is transmitted in a more secure and robust manner. Direct transmission of data over the communication channel is not secure as it can be easily manipulated and is prone to interception by eavesdroppers. So as an attractive solution to these issues, var...
متن کاملA Survey on Digital Image Steganographic Methods
Many approaches and techniques are available in the literature for information hiding. Figure 1 shows a generic embedding and extracting scheme. The inputs to the embedding scheme are the hiding message, the cover data and an optional public or secret key K. The output is stego data, also called stego object. Inputs to the generic extracting scheme are the tested data, the secret or public key,...
متن کاملUtilizing Strategic Management Accounting Techniques in Iranian Firms
The main objective of this article is to describe and explain the utilization of Strategic Management Accounting Techniques (SMATs) in Iranian various firms. For this, a survey was carried out using questionnaires provided for the seventy-five Chief Executive Officers in productive and services firms. Data gathered from respondents about the usage rate of SMATs based on the five-point Likert sc...
متن کاملStegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
We discuss a class of smartphone malware that uses steganographic techniques to hide malicious executable components within their assets, such as documents, databases, or multimedia files. In contrast with existing obfuscation techniques, many existing information hiding algorithms are demonstrably secure, which would make such stegomalware virtually undetectable by static analysis techniques. ...
متن کاملA Detailed look at Steganographic Techniques and their use in an Open-Systems Environment
This paper's focus is on a relatively new field of study in Information Technology known as Steganography. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic techniques available today. The paper will close by looking at how we can use Steganography in ...
متن کامل