• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 11 (5), 2012
  3. 566-576
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2012 | Volume: 11 | Issue: 5 | Page No.: 566-576
DOI: 10.3923/itj.2012.566.576

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 147

Authors


Rengarajan Amirtharajan


Jiaohua Qin

Country: China

John Bosco Balaguru Rayappan


Keywords


  • Information hiding
  • random image steganography
  • steganalysis
Review Article

Random Image Steganography and Steganalysis: Present Status and Future Directions

Rengarajan Amirtharajan, Jiaohua Qin and John Bosco Balaguru Rayappan
In the current corporate scenario, data or information security is the most significant asset because loss of information will lead to financial and market loss which in-turn will be the end of business. Though, the security guards like cryptography, watermarking, steganography have armed on the electromagnetic pathway against hackers, the concern on data protection is growing in parallel with the up-to-the-minute electronic technology. In this review, the role, strength and weakness of steganography especially different random image steganography techniques in protecting the data have been analyzed and in addition how random techniques can be made smarter and effective have also been explored.
PDF Fulltext XML References Citation

How to cite this article

Rengarajan Amirtharajan, Jiaohua Qin and John Bosco Balaguru Rayappan, 2012. Random Image Steganography and Steganalysis: Present Status and Future Directions. Information Technology Journal, 11: 566-576.

DOI: 10.3923/itj.2012.566.576

URL: https://scialert.net/abstract/?doi=itj.2012.566.576

Related Articles

Data Security Through Data Hiding in Images: A Review
Graphical Password Authentication Scheme for Embedded Platform
Image Encryption: An Information Security Perceptive
Galois Field Proficient Product for Secure Image Encryption on FPGA
Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
Arabic Text Steganography using Kashida Extensions with Huffman Code
Hiding Data in Video File: An Overview
Secure Topology for Electronic Medical Record Transmissions
An Overview on Hiding Information Technique in Images
On the Capacity and Security of Steganography Approaches: An Overview

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved