|
|
Mind Game for Cover Steganography: A Refuge |
Rengarajan Amirtharajan,
S. Deepak Roy,
Noel Nesakumar,
M. Chandrasekar,
R. Sridevi and J.B.B. Rayappan |
Abstract:
Living in the world of advanced and supercharged technology, habituation of
internet information and computing contraptions has become inexplicably greater
than before. Accordingly, communication and depot of facts, that too of confidence,
has turned out to be an eminent antecedence. Thus the greater the furtherance,
the greater is the need of defense. It is so because one can notice that every
avant-garde digital felony has something to do with the security. Also technological
progression has made a lot easier in communicating data however is assailable
to snap and snatch by gatecrashers. Of all the other criteria, security tops
the list for the reason that the information to be communicated may be of authoritative,
high precision and insightful. To prevail over this issue come the solution
in disguise, Cryptography and Steganography. Their ultimate endeavor is to have
secure communication in its own right. While the former deals with text mostly,
the other one deals with digital files in this modern epoch. Their intermingling
is now a widely practiced platform of secret sharing. Like the rest, Image Steganography
too has some basic jargons. The main of such is Cover image that is the image
chosen to hide the surreptitious information. Faultless steganographic schemes
lie upon the choice of building block and for sure cover images. This article
takes this outlook and suggests a new way of cover generation. Thought provoking
ideas are the magnificence of this script which will definitely be picked up
by the researchers in the near future.
|
|
PDF
Fulltext
XML
References
Citation
Report Citation
|
|
|
RELATED ARTICLES: |
|
|
|
|
|
|
|
|
|
How to cite this article:
Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind Game for Cover Steganography: A Refuge. Research Journal of Information Technology, 5: 137-148. DOI: 10.17311/rjit.2013.137.148 URL: https://scialert.net/abstract/?doi=rjit.2013.137.148
|
|
|
|
COMMENT ON THIS PAPER |
|