Steganography Essay

1729 Words7 Pages

steganography and cryptography. The main advantage of steganography algorithm is because of its simple security mechanism. There are several steganography techniques used for hiding data such as batch steganography, permutation steganography, least significant bits (LSB), bit-plane complexity segmentation (BPCS) and chaos based spread spectrum image steganography (CSSIS)[9].

In 2013, Akanksha Kaushal persents a comparative study of image steganography in spatial domain & frequency domain. LSB techniques in a spatial domain have a high payload capacity & give good performance results but they often fail to prevent statistical attack & are thus easily detected & if the presence of hidden information is revealed or even suspected the purpose of steganography is partly defected therefore it is recommended to use the promising frequency domain techniques for steganography using DCT, DFT [7]
In Feb 2012 Hardik Patel, Preeti Dave, mentions Steganography Technique Based on DCT Coefficients in which the image is hided in cover image by replacing least significant bit of cover image with …show more content…

The file format is now supported across multiple file systems and operating systems, but is being used less and less often. A key reason for this is the large file size, resulting from poor compression and verbose file format. This is, however, an advantage for hiding data without raising suspicion. To understand how bitmap images can be used to conceal data, the file format must first be explained. A bitmap file can be broken into two main blocks, the header and the data. The header, which consists of 54 bytes, can be broken into two sub-blocks. These are identified as the Bitmap Header, and the bitmap information. Images which are less than 16 bits have an additional sub block within the header labeled the color

More about Steganography Essay

Open Document