The document summarizes research on steganography and steganalysis from several academic papers and technical reports published between 2004-2014. It discusses various techniques for hiding secret messages in digital files like images, video, and text using properties of pixels, bit planes, and sentences. It also reviews methods for detecting hidden messages and analyzing images/files for possible embedded secret data, including techniques using statistical analysis, feature selection algorithms, and spatial/transform domain approaches.
The document summarizes research on steganography and steganalysis from several academic papers and technical reports published between 2004-2014. It discusses various techniques for hiding secret messages in digital files like images, video, and text using properties of pixels, bit planes, and sentences. It also reviews methods for detecting hidden messages and analyzing images/files for possible embedded secret data, including techniques using statistical analysis, feature selection algorithms, and spatial/transform domain approaches.
The document summarizes research on steganography and steganalysis from several academic papers and technical reports published between 2004-2014. It discusses various techniques for hiding secret messages in digital files like images, video, and text using properties of pixels, bit planes, and sentences. It also reviews methods for detecting hidden messages and analyzing images/files for possible embedded secret data, including techniques using statistical analysis, feature selection algorithms, and spatial/transform domain approaches.
Ghosh, A Greedy Approach to Text Steganography using
Properties of Sentences, Proceedings of the 2011 Eighth International Conference on Information Technology(ITNG 2011), ISBN: 978-0-7695-4367-3, pp. 30-35, Las Vegas, NV, USA. F.G. Mohammadi, M.S. Abadeh A survey of data mining techniques for steganalysis Recent Advances in Steganography (2012), pp. 125 Geetha, S., Kamaraj, N., 2010. Optimized Image Steganalysis through Feature Sele ction Using MBEGA. arXiv Preprint arXiv:1008.2824. Sara Khosravi, Mashallah Abbasi Dezfoli, Mohammad Hossein Yektaie, A new stegano graphy method based HIOP (Higher Intensity Of Pixel) algorithm and Strassen's matrix multiplication, Journal of Global Research in Co mputer Science, Vol. 2, No. 1, 2011. Stallings, William, Network Security Essentials, applications and Standards p.75, Pearson Education, Inch, 2007.( Technical report with report number) Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Comple xity Segmentation. JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, 108-112 Hamid.A.Jalab, A.A Zaidan and B.B Zaidan Steganography and Steganalysis J.R. Krenn 2004) http://www.krenn.nl/univ/cry/steg/article.pdf Dickman, S.D. (2007). An Overview of Steganography. Retrieved from http://ce.sha rif.edu/courses/89-90/2/ce342-1/resources/root/Critical%20Reading%20Presentation s/Steganography,%20Related%20Resources/2-An%20Overview%20of%20Steganography.pdf World Applied Programming, Vol (1), No (3), August 2011. 191-195 Nosrati, M., Karimi, R., & Hariri, M. (2011). An introduction to steganography m ethods Sara Khosravi, Mashallah Abbasi Dezfoli, Mohammad Hossein Yektaie, A new stegano graphy method based HIOP (Higher Intensity Of Pixel) algorithm and Strassen's matrix multiplication, Journal of Global Research in Co mputer Science, Vol. 2, No. 1, 2011. Art of Hiding: An Introduction to Steganography. International Journal Of Engine ering And Computer Science Volume1 Issue 1 Oct 2012 Page No. 11-22 Maninder Singh Rana, Bhupender Singh San gwan , Jitendra Singh Jangir Shashikala Channalli, Ajay Jadhav Steganography An Art of Hiding DataInternational Journal on Computer Science and Engineering Vol.1(3), 2009, 137-141 Ulrich, R., & Miller, J. (2004). Threshold estimation in two-alternative forced- choice (2AFC) tasks: The SpearmanKrber method. Perception & Psychophysics 2004, 66 (3), 517-533. V. Holub, J. Fridrich, T. Denemark Random projections of residuals as an alternative to co-occurrences in steganaly sis Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Foren sics XV (2013), p. 8665 Active steganalysis for interpolation-error based reversible data hiding Pattern Recognition Letters, Volume 34, Issue 9, 1 July 2013, Pages 1032-1036 Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei, Hui-Feng Huang Image steganalysis using a bee colony based feature selection algorithm Original Research Article Engineering Applications of Artificial Intelligence, Volume 31, May 2014, Pages 35-43 F. Ghareh Mohammadi, M. Saniee Abadeh A new steganography method which preserves histogram: Generalization of LSB++ Or iginal Research Article Information Sciences, In Press, Corrected Proof, Available online 8 February 201 4 Kazem Qazanfari, Reza Safabakhsh A Text based Steganography Technique with Indian Root Original Research Article Procedia Technology, Volume 10, 2013, Pages 167-171 Souvik Roy, P. Venkateswaran Secret sharing with multi-cover adaptive steganography Original Research Article Information Sciences, Volume 254, 1 January 2014, Pages 197-212 Hai-Dong Yuan Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun Adaptive data hiding in edge areas of images with spatial LSB domain systems IEEE Trans. Informat. Forensics Secur., 3 (3) (2008), pp. 488497 S.Changder, N. C. Debnath, D.Ghosh, A Greedy Approach to Text Steganography using Properties of Sentences, Proceedings of the 2011 Eighth International Conference on Information Technology(ITNG 2011), ISBN: 978-0-7695-4367-3, pp. 30-35, Las Vegas, NV, USA. R. Chandramouli A mathematical framework for active steganalysis Multimedia Syst., 9 (3) (2003), pp. 303311 Groenewald, T. (2004). A Phenomenological Research Design Illustrated. Internati onal Journal of Qualitative Methods 3(1). Retrieved from http://www.ualberta.ca/ ~iiqm/backissues/3_1/pdf/groenewald.pdf Christensen, L.B., Johnson, R.B., and Turner, L.A. (2010).Research methods,desig n, and analysis (11th ed.). Boston, MA: Allyn & Bacon. Aspers, P. (2009). Empirical Phenomenology: A Qualitative Research Apparoch (The Cologne Seminars). Retrieved from http://www.ajol.info/index.php/ipjp/article/v iewFile/61109/49294 Chaos based Edge Adaptive Image Steganography Original Research Article Procedia Technology, Volume 10, 2013, Pages 138-146 Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder JPEG steganography detection with Benford's Law Original Research Article Digital Investigation, Volume 9, Issues 34, February 2013, Pages 246-257 Panagiotis Andriotis, George Oikonomou, Theo Tryfonas Secure Encrypted Steganography Graphical Password scheme for Near Field Communic ation smartphone access control system Original Research Article Expert Systems with Applications, Volume 41, Issue 7, 1 June 2014, Pages 3561-35 68 Soon-Nyean Cheong, Huo-Chong Ling, Pei-Lee Teh Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting Shunquan Tan, Bin Li IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 6, JUNE 2012 336-339 Threshold estimation in two-alternative forced-choice (2AFC) tasks: The SpearmanKrber method ROLF ULRICH JEFF MILLER Perception & Psychophysics 2004, 66 (3), 517-533 Bateman, P. (2008). Image Steganography and Steganalysis. Retrieved from http:// www.computing.surrey.ac.uk/personal/st/H.Schaathun/projects/Past/phil-msc.pdf