Subscribe Now Subscribe Today
Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 137-148
DOI: 10.17311/rjit.2013.137.148
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Mind Game for Cover Steganography: A Refuge

Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan

Living in the world of advanced and supercharged technology, habituation of internet information and computing contraptions has become inexplicably greater than before. Accordingly, communication and depot of facts, that too of confidence, has turned out to be an eminent antecedence. Thus the greater the furtherance, the greater is the need of defense. It is so because one can notice that every avant-garde digital felony has something to do with the security. Also technological progression has made a lot easier in communicating data however is assailable to snap and snatch by gatecrashers. Of all the other criteria, security tops the list for the reason that the information to be communicated may be of authoritative, high precision and insightful. To prevail over this issue come the solution in disguise, Cryptography and Steganography. Their ultimate endeavor is to have secure communication in its own right. While the former deals with text mostly, the other one deals with digital files in this modern epoch. Their intermingling is now a widely practiced platform of secret sharing. Like the rest, Image Steganography too has some basic jargons. The main of such is Cover image that is the image chosen to hide the surreptitious information. Faultless steganographic schemes lie upon the choice of building block and for sure cover images. This article takes this outlook and suggests a new way of cover generation. Thought provoking ideas are the magnificence of this script which will definitely be picked up by the researchers in the near future.
PDF Fulltext XML References Citation Report Citation
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
How to cite this article:

Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind Game for Cover Steganography: A Refuge. Research Journal of Information Technology, 5: 137-148.

DOI: 10.17311/rjit.2013.137.148






Curve Bottom