New and Unconventional Techniques in Pictorial Steganography and Steganalysis

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3

Abstract

 Steganography involves transferring data through a given channel in such a way that the communication channel itself is hidden from all involved parties. It is a form of security through obscurity; this technique protects both messages and stations involved in communication. In the most modern form of digital steganography, electronic communication may include complex steganographic lines of code inside transport layer which accomplishes the aforementioned task of protecting data and anonymity of participating stations. Steganography is much confused with the term cryptography former is fundamentally different in the sense that the message is sent secretly without attracting any attention of third party intruders by protecting anonymity of involved channels, nodes and stations

Authors and Affiliations

Vikas Kothari

Keywords

Related Articles

Classificationof Stages of Lung Cancer using Genetic Candidate Group Search Approach

Abstract: Cancer is one of the most commonly affected diseases in the progressing countries. Early diagnosis of cancer plays a significant role in curing cancer patients. Thousands of people every year die due to lung ca...

 An Enhanced Detection of Outlier using Independent Component Analysis among Multiple Data Instances via Oversampling

 Abstract: Anomaly is a pattern of data that does not conforms to expected behavior. It is also referred as outlier, exceptions, peculiarities, surprise etc. Anomaly detection aims to identify a small group of insta...

 Mobile, Secure E - Voting Architecture for the Nigerian ElectoralSystem

 Abstract: This work discusses electronic voting for the Nigerian electoral system, modeling a two-levelhierarchical architecture that includes the national and state level infrastructure. This solves most of theele...

 Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

 Abstract: Ad hoc wireless network is defined as a collection of mobile platforms or nodes where each node is free to move. Each node is logically consisting of a router that may have multiple hosts and that also ma...

 Laser pointer interaction for 3D angiography operation

Abstract: A primary challenge for creating an interactive display in operating room (OR) is in the definition of control methods that are efficient and easy to learn for the physician. Apart from traditional input method...

Download PDF file
  • EP ID EP157144
  • DOI -
  • Views 70
  • Downloads 0

How To Cite

Vikas Kothari (2013).  New and Unconventional Techniques in Pictorial Steganography and Steganalysis. IOSR Journals (IOSR Journal of Computer Engineering), 14(3), 37-41. https://europub.co.uk/articles/-A-157144