Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 137-148
DOI: 10.3923/rjit.2013.137.148
Mind Game for Cover Steganography: A Refuge
Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan

Abstract:
Living in the world of advanced and supercharged technology, habituation of internet information and computing contraptions has become inexplicably greater than before. Accordingly, communication and depot of facts, that too of confidence, has turned out to be an eminent antecedence. Thus the greater the furtherance, the greater is the need of defense. It is so because one can notice that every avant-garde digital felony has something to do with the security. Also technological progression has made a lot easier in communicating data however is assailable to snap and snatch by gatecrashers. Of all the other criteria, security tops the list for the reason that the information to be communicated may be of authoritative, high precision and insightful. To prevail over this issue come the solution in disguise, Cryptography and Steganography. Their ultimate endeavor is to have secure communication in its own right. While the former deals with text mostly, the other one deals with digital files in this modern epoch. Their intermingling is now a widely practiced platform of secret sharing. Like the rest, Image Steganography too has some basic jargons. The main of such is Cover image that is the image chosen to hide the surreptitious information. Faultless steganographic schemes lie upon the choice of building block and for sure cover images. This article takes this outlook and suggests a new way of cover generation. Thought provoking ideas are the magnificence of this script which will definitely be picked up by the researchers in the near future.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Cryptic Cover for Covered Writing: A Pre-Layered Stego
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
How to cite this article:

Rengarajan Amirtharajan, S. Deepak Roy, Noel Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind Game for Cover Steganography: A Refuge. Research Journal of Information Technology, 5: 137-148.

DOI: 10.3923/rjit.2013.137.148

URL: https://scialert.net/abstract/?doi=rjit.2013.137.148

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 

Curve Bottom