Relative Antropy Based Analysis of Image Steganography Techniques

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2011 by IJPTT Journal
Volume-1 Issue-3                           
Year of Publication : 2011
Authors : Kamaldeep

Citation

Kamaldeep."Relative Antropy Based Analysis of Image Steganography Techniques". International Journal of P2P Network Trends and Technology (IJPTT), V1(3):1-4  Nov - Dec 2011, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Steganography is the art and science of hiding the data within some cover media like image file, audio file, video file, text file etc. in such a manner that no one apart from the sender and receiver can determine the existence of the message in the cover file. Images are very common cover files that are transmitted over the internet. They can carry large amount of information. In image steganography, we choose image as a cover file for insertion of the message. In this paper, we analyze some existing techniques of image steganography on the basis of relative entropy metric.

References

[1] N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26-34, February 1998.
[2] D. Kahn, The Codebreakers, Macmillian, New York, 1967.
[3] B. Norman, Secret Warfare, Acropolis Books, Washington D.C., 1973.
[4] Amirtharajan Rengarajan, Ganesan Vivek, Jithamanyu R, Rayappan John Bosco Balaguru, “An Invisible Communication for Secret Sharing against Transmission Error”, Universal Journal of Computer Science & Engineering Technology, 1 (2), 117-121, Nov – 2010.
[5] Simmons G. J, “The Prisoners Problem and the Subliminal Channel”, Proceedings of crypto ’83, Plenum Press, pp 51-67, 1983.
[6] Anderson R. J, “Stretching the Limit of Steganography”, In Information Hiding, Springer Lecture Notes in Computer Science, Vol. 1174, pp 39-48, 1996.
[7] Anderson R. J, Peticolas FAP, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16 No 4, pp 474-481, May 1998.
[8] NEIL F. JOHNSON, ZORAN DURIC, S. G. J. Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1). Kluwer Academic Publishers, February 15, 2001.
[9] R.Amirtharajan, R. Akila, P.Deepikachowdavarapu, “A Comparative Analysis of Image Steganography”. International Journal of Computer Applications 2(3):(2010)41–47.

Keywords

Data Hiding, Steganography, Image etc.