Thursday, 28 Mar, 2024

+91-9899775880

011-47044510

011-49075396

Steganography Model Techniques, Taxonomy with Deniable Methodology and Data Concealing in Image using Steganography

Journal of Network and Information Security

Volume 9 Issue 1

Published: 2021
Author(s) Name: Abhay Verma and Vinay Verma | Author(s) Affiliation: Student, Dept. of Comp. Science and Engineering, Vivekananda Inst. of Tech., Jaipur, Rajasthan.
Locked Subscribed Available for All

Abstract

The radical enhancements in the technology and internet has led information to be shared in just single click. As a result, it really became important to worry about the intellectual property protection on the internet. Steganography and cryptography could be very much useful in achieving the secure transfer of the information. Steganography is a practice that prevent unauthorized user from accessing and reading the secret data. It is a scientific art of covering the information so that it remains undetected to everyone except the intended receiver. In this technique, carrier plays an important role and must be selected in such a way that it does not leave behind any trace of the hidden message. There is always a threat that any person can detect the hidden object and could reveal the secret, but there is also a concept of deniable strategy in steganography which in such cases reveals the secondary data instead of primary one and keep that secure. The paper is meant to introduce with the introductory concept of steganography, classification of steganography centered on various file formats support (images, videos, protocols, text, etc.), deniable steganography which is providing additional layer of security and analysis of the noticeable changes created in stego-object as compared to original carrier.

Keywords: Cryptography, Deniable steganography, Image steganography analysis, Steganography, Steganography model.

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved