Comparative study of different steganographic techniques

Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undet...

Full description

Bibliographic Details
Main Authors: Zeki, Akram M., Ibrahim, Adamu A., A. Manaf, Azizah, Abdullah, Shahidan M.
Format: Conference or Workshop Item
Language:English
Published: 2011
Subjects:
Online Access:http://irep.iium.edu.my/8897/
http://irep.iium.edu.my/8897/
http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf
id iium-8897
recordtype eprints
spelling iium-88972014-12-08T07:57:42Z http://irep.iium.edu.my/8897/ Comparative study of different steganographic techniques Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. TK Electrical engineering. Electronics Nuclear engineering Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. When it comes to the pro and cons of various Steganographic software, many have been designed; each of them has different features and capabilities for data hiding, hence, this makes it a wide and attractive field for further research, in which the establishment of innovative methods and techniques could be done. Different Steganographic techniques were studied; experiment was carried out using five Steganographic software. Finally comparison was done using benchmarking tool for identifying different performance aspects of the Steganographic techniques and Steganographic software like visual quality, performance indices, memory requirement and the evaluation of the maximum capacity for each software under this study. Experimental results show that all the software under this study performs above optimal level, although there are some differences of features and capabilities observed. 2011-10-03 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf Zeki, Akram M. and Ibrahim, Adamu A. and A. Manaf, Azizah and Abdullah, Shahidan M. (2011) Comparative study of different steganographic techniques. In: 11th WSEAS International Conference on Applied Computer Science (ACS 2011), 3-5 October 2011, Penang, Malaysia. http://www.wseas.us/e-library/conferences/2011/Penang/ACRE/ACRE-06.pdf
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Zeki, Akram M.
Ibrahim, Adamu A.
A. Manaf, Azizah
Abdullah, Shahidan M.
Comparative study of different steganographic techniques
description Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. When it comes to the pro and cons of various Steganographic software, many have been designed; each of them has different features and capabilities for data hiding, hence, this makes it a wide and attractive field for further research, in which the establishment of innovative methods and techniques could be done. Different Steganographic techniques were studied; experiment was carried out using five Steganographic software. Finally comparison was done using benchmarking tool for identifying different performance aspects of the Steganographic techniques and Steganographic software like visual quality, performance indices, memory requirement and the evaluation of the maximum capacity for each software under this study. Experimental results show that all the software under this study performs above optimal level, although there are some differences of features and capabilities observed.
format Conference or Workshop Item
author Zeki, Akram M.
Ibrahim, Adamu A.
A. Manaf, Azizah
Abdullah, Shahidan M.
author_facet Zeki, Akram M.
Ibrahim, Adamu A.
A. Manaf, Azizah
Abdullah, Shahidan M.
author_sort Zeki, Akram M.
title Comparative study of different steganographic techniques
title_short Comparative study of different steganographic techniques
title_full Comparative study of different steganographic techniques
title_fullStr Comparative study of different steganographic techniques
title_full_unstemmed Comparative study of different steganographic techniques
title_sort comparative study of different steganographic techniques
publishDate 2011
url http://irep.iium.edu.my/8897/
http://irep.iium.edu.my/8897/
http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf
first_indexed 2023-09-18T20:18:42Z
last_indexed 2023-09-18T20:18:42Z
_version_ 1777407961500483584