A NOVEL APPROACHES TOWARDS

For increase network security of messages sent on internet the steganography is mostly preferred. To transmit data secretly steganography is used in open system environment. In this paper discussed the reviews of image steganography and the general framework of image steganography using different method. Steganography is nothing but art of hide information behind the other information without leaving remarkable track on original message. Keywords— Cryptography, Steganography, Watermarking, LSB, DCT, etc I. HISTORY OF STEGANOGRAPHY

[1]  R. Zavaleta,et al.  Dynamic Steganography Adds Additional Data Security , 2004, IEEE SoutheastCon, 2004. Proceedings..

[2]  Xiaolin Wu,et al.  A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.

[3]  Bijoy Bandyopadhyay,et al.  Steganography and Steganalysis: Different Approaches , 2011, ArXiv.

[4]  A. K. Saxena,et al.  Improvisation of Security Aspect in Steganography Applying DES , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[5]  Garima Tomar,et al.  Effect of Noise on image steganography based on LSB insertion and RSA encryption , 2012 .

[6]  Li Zhi,et al.  Detection of random LSB image steganography , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[7]  Tao Zhang,et al.  Detection of LSB Steganography based on Image Smoothness , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[8]  Ali N. Akansu,et al.  Capacity estimates for data hiding in compressed images , 2001, IEEE Trans. Image Process..

[9]  Shailender Gupta,et al.  Information Hiding Using Least Significant Bit Steganography and Cryptography , 2012 .

[10]  S. Han,et al.  Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[11]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[12]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[13]  B. S. Manjunath,et al.  Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[14]  S. P. Bansod,et al.  Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).

[15]  V. Thakur,et al.  Hiding secret image in video , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[16]  Kaustubh Choudhary Properties of Images in LSB Plane , 2012 .

[17]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[18]  Chin-Chen Chang,et al.  An effective image steganographic scheme based on wavelet transformation and pattern-based modification , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..

[19]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.

[20]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[21]  S. Goel,et al.  Comparison of Image Steganography Techniques , 2013 .

[22]  Hassan Barada,et al.  A testbed for evaluating security and robustness of steganography techniques , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[23]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[24]  Dhananjay Kulkarni,et al.  A Steganography-based framework to prevent active attacks during user authentication , 2013, 2013 8th International Conference on Computer Science & Education.

[25]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[26]  Chun-Shien Lu Dual security-based image steganography , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[27]  Yu-Chee Tseng,et al.  A secure data hiding scheme for two-color images , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.

[28]  Nitin Jain,et al.  Image Steganography Using LSB and Edge - Detection Technique , 2012 .

[29]  Mohammad Shirali-Shahreza Improving Mobile Banking Security Using Steganography , 2007, Fourth International Conference on Information Technology (ITNG'07).

[30]  Rosziati Ibrahim,et al.  Steganography Algorithm to Hide Secret Message inside an Image , 2011, ArXiv.

[31]  Sukumar Nandi,et al.  Online Voting System Powered by Biometric Security Using Steganography , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[32]  Lisa M. Marvel,et al.  A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[33]  Li Xia,et al.  Enhancing iris-feature security with steganography , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[34]  Vikas Tyagi,et al.  IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY , 2012 .