Open Access
Subscription Access
Steganography Model Techniques, Taxonomy with Deniable Methodology and Data Concealing in Image using Steganography
Subscribe/Renew Journal
The radical enhancements in the technology and internet has led information to be shared in just single click. As a result, it really became important to worry about the intellectual property protection on the internet. Steganography and cryptography could be very much useful in achieving the secure transfer of the information. Steganography is a practice that prevent unauthorized user from accessing and reading the secret data. It is a scientific art of covering the information so that it remains undetected to everyone except the intended receiver. In this technique, carrier plays an important role and must be selected in such a way that it does not leave behind any trace of the hidden message. There is always a threat that any person can detect the hidden object and could reveal the secret, but there is also a concept of deniable strategy in steganography which in such cases reveals the secondary data instead of primary one and keep that secure. The paper is meant to introduce with the introductory concept of steganography, classification of steganography centered on various file formats support (images, videos, protocols, text, etc.), deniable steganography which is providing additional layer of security and analysis of the noticeable changes created in stego-object as compared to original carrier.
Keywords
Cryptography, Deniable steganography, Image steganography analysis, Steganography, Steganography model.
Subscription
Login to verify subscription
User
Font Size
Information
Abstract Views: 184
PDF Views: 96