COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS
Abstract
About the Authors
S. A. SeyyediRussian Federation
R. Kh. Sadykhov
Russian Federation
References
1. Currie, D.L. Surmounting the effects of lossy compression on Steganography / D.L. Currie,C.E. Irvine // 19th National Information Systems Security Conference. – Baltimore, 1996.
2. Ahsan, K. Practical Data hiding in TCP/IP / K. Ahsan, D. Kundur // Proceedings of the Workshop on Multimedia Security at ACM Multimedia. – Canada, 2002.
3. Johnson, N.F. Exploring Steganography: Seeing the Unseen / N.F. Johnson, S. Jajodia // Computer Journal. – 1998. – Vol. 31, № 2. – P. 26–34.
4. Katzenbeisser, S. Information Hiding Techniques for Steganography and Digital Watermarking / S. Katzenbeisser, F.A.P. Petitcolas. – Norwood, MA : Artech House, 2000.
5. Niimi, M. High Capacity and Secure Digital Steganography to Palette-Based Images / M. Niimi // IEEE International conference on image processing. – Japan, 2002. – Vol. 2. – P. 917–920.
6. Al-Sadoon, B. On the Development of Steganographic Tools / B. Al-Sadoon, H. Mathkour, Gh. Assassa // Proceedings of the 1st National Information Technology Symposium, NITS. – Riyadh, Saudi Arabia, 2006.
7. Morkel, T. An Overview of Image Steganography / T. Morkel, J.H.P. Eloff, M.S. Olivier. – South Africa : University of Pretoria, 2002.
8. Bender W. Techniques for data hiding / W. Bender, D.Gruhl // IBM Systems Journal. – 1996. – Vol. 35, № 3–4.
9. Krenn, R. Steganography and steganalysis, Internet Publication, March 2004 [Electronic resource] / R. Krenn. – Mode of access : http://www.krenn.nl/univ/cry/steg/article.pdf. – Date of access : 24.12.2012.
10. Steganography Software [Electronic resource]. – Mode of access : http://www.jjtc.com/Steganography/tools.html. – Date of access : 23.12.2012.
11. Brundick, F. Implementation of Spread Spectrum Image Steganography / F. Brundick, L. Marvel [Electronic resource]. – 2001. – Mode of access : http://permanent.access.gpo.gov/gpo2618/ARL-TR-2433.pdf. – Date of access : 24.12.2012.
12. Chang, C.C. Introduction to the Visual Cryptography / C.C. Chang, L.Z. Chuang // Communication of the Chinese Cryptology and Information Security Association (CCISA). – 2004. – Vol. 10, № 2. – P. 1–14.
13. Meenu Kumari, A. JPEG Compression Steganography & Crypography Using Image-Adaptation Technique / A. Meenu Kumari, P. Khare // Journal of Advances in Information Technology.– 2010. – Vol. 1, № 3.
14. Bushra Kassim Al-Abudi. Colour Image Data Compression Using Multilevel Block Trunsaction Coding Technique / Bushra Kassim Al-Abudi // Phd Thesis. – Baghdad : College of Science,2002.
15. Sua’d Kakil, A. Image in Image Hiding System using Iterated Function System (IFS) /A. Sua’d Kakil // Msc Thises. – Iraq : University of Sulaimani, 2009.
16. Khosravi, S. A new steganography method based HIOP (Higher Intensity Of Pixel) algorithm and Strassen's matrix multiplication / S. Khosravi, M.A. Dezfoli, M.H. Yektaie // Journal of Global Research in Computer Science. – 2011. – Vol. 2, № 1.
17. Mathkour, H. A New Image Steganography Technique / H. Mathkour, B. Al-Sadoon, A. Touir // Wireless Communications, Networking and Mobile Computing (WiCOM) : 4th International Conference on IEEE. – Dalian, China, 2008. – P. 1–4.
18. Babu, S. Authentication of Secret Information in Image Steganography / S. Babu, K.B. Raja // IEEE. – India : University of Heydarabad, 2008. – P. 1–6.
Review
For citations:
Seyyedi S.A., Sadykhov R.Kh. COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS. Informatics. 2013;(1):66-75. (In Russ.)