Digital Steganography: Hiding Data within Data
IEEE Internet Computing
Significance of Steganography on Data Security
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images
ICISIP '05 Proceedings of the 2005 3rd International Conference on Intelligent Sensing and Information Processing
A New Method for Data Hiding Domain Classification
IFITA '09 Proceedings of the 2009 International Forum on Information Technology and Applications - Volume 03
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 03
An application of linear mixed effects model to steganography detection
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
A new methodology for data coding and embedding for high-capacity transmitting
International Journal of Electronic Security and Digital Forensics
On the limits of steganography
IEEE Journal on Selected Areas in Communications
An enhanced Hill cipher approach for image encryption in steganography
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
In current digital era, people are using e-devices such as ipods, iphones and cell phones for capturing the static and dynamic images. However, these images have a compromised size and quality due to fixed memory dimension. But, in the multi-media messaging service (MMS) of cell phones and iphones, they may participate as a cover medium, strengthening the steganography communication. The different methods of steganography are mostly applied on image files to embed the data. In all these cases, the principle of replacing the entire or some parts of the chosen pixel may not be able to utilise all the available memory area of an image for the purpose of the secret data. This paper presents a new high capacity steganographic technique to hide information. Three different techniques out of which two are to embed the plain text and one is for all type of data to embed in image. Based on these methods, we have constructed secured MMS creator and short message service creator viewer in Microsoft platform for providing data embedding in new e-devices.