Digital Steganography: Hiding Data within Data
IEEE Internet Computing
A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images
ICISIP '05 Proceedings of the 2005 3rd International Conference on Intelligent Sensing and Information Processing
Upper and lower bounds on black-box steganography
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Spread spectrum image steganography
IEEE Transactions on Image Processing
High capacity and secured methodologies for steganography
International Journal of Electronic Security and Digital Forensics
A novel methodology for data hiding in Microsoft Word file
International Journal of Internet Technology and Secured Transactions
Steganographic manipulations with elliptic curve cryptography
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
The rapid development of internet opened up unlimited opportunities in the field of computing. However, it brought about a plethora of new issues and concerns, chief among them is the security of information that to be exchanged. Developing information hiding techniques have been seriously taken by many researchers, steganography, the science of embedding secret information into carrier image file is one of the main concern. In the current digital era, the steganographic methods may participate in the field of ultra wideband wireless communication, but the major hurdles is the pre-existing carrier with low embedding capacity. If we create the carrier file based on the transmitting message that will help us in two aspects, first it saves the bandwidth and second it maintains the utmost security as well. Unlike the other steganographic efforts, where data embedding in carrier file works in the principle of pre-existing carrier file, we propose here a method that works on the principle of creating its own carrier file based on the transmitting message. The major advantage of this approach is that there is never a mother carrier file created or exits in order to give a chance to other concerned to suspect the hiding of any secret file and at the same time, we utilise the minimum bandwidth with maximum security protection.