Image Steganography Using Frequency Domain

Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Technologies that are closely related to steganography and watermarking and fingerprinting . High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm. Quantized-frequency Secure Audio Steganography algorithm. Integer Transform based Secure Audio Steganography algorithm.

[1]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[2]  Tariq Jamil Steganography: the art of hiding information in plain sight , 1999 .

[3]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[4]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[5]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[6]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[7]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[8]  Xingang You,et al.  A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[9]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[10]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[11]  Joshua Silman,et al.  Steganography and Steganalysis: An Overview , 2001 .

[12]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[13]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[14]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..