Comparative study of different steganographic techniques
Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undet...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/8897/ http://irep.iium.edu.my/8897/ http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf |
id |
iium-8897 |
---|---|
recordtype |
eprints |
spelling |
iium-88972014-12-08T07:57:42Z http://irep.iium.edu.my/8897/ Comparative study of different steganographic techniques Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. TK Electrical engineering. Electronics Nuclear engineering Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. When it comes to the pro and cons of various Steganographic software, many have been designed; each of them has different features and capabilities for data hiding, hence, this makes it a wide and attractive field for further research, in which the establishment of innovative methods and techniques could be done. Different Steganographic techniques were studied; experiment was carried out using five Steganographic software. Finally comparison was done using benchmarking tool for identifying different performance aspects of the Steganographic techniques and Steganographic software like visual quality, performance indices, memory requirement and the evaluation of the maximum capacity for each software under this study. Experimental results show that all the software under this study performs above optimal level, although there are some differences of features and capabilities observed. 2011-10-03 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf Zeki, Akram M. and Ibrahim, Adamu A. and A. Manaf, Azizah and Abdullah, Shahidan M. (2011) Comparative study of different steganographic techniques. In: 11th WSEAS International Conference on Applied Computer Science (ACS 2011), 3-5 October 2011, Penang, Malaysia. http://www.wseas.us/e-library/conferences/2011/Penang/ACRE/ACRE-06.pdf |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. Comparative study of different steganographic techniques |
description |
Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. When it comes to the pro and cons of various Steganographic software, many have been designed; each of them has different features and capabilities for data hiding, hence, this makes it a wide and attractive field for further research, in which the establishment of innovative methods and techniques could be done. Different Steganographic techniques were studied; experiment was carried out using five Steganographic software. Finally comparison was done using benchmarking tool for identifying different performance aspects of the Steganographic techniques and Steganographic software like visual quality, performance indices, memory requirement and the evaluation of the maximum capacity for each software under this study. Experimental results show that all the software under this study performs above optimal level, although there are some differences of features and capabilities observed. |
format |
Conference or Workshop Item |
author |
Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. |
author_facet |
Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. |
author_sort |
Zeki, Akram M. |
title |
Comparative study of different steganographic techniques |
title_short |
Comparative study of different steganographic techniques |
title_full |
Comparative study of different steganographic techniques |
title_fullStr |
Comparative study of different steganographic techniques |
title_full_unstemmed |
Comparative study of different steganographic techniques |
title_sort |
comparative study of different steganographic techniques |
publishDate |
2011 |
url |
http://irep.iium.edu.my/8897/ http://irep.iium.edu.my/8897/ http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf |
first_indexed |
2023-09-18T20:18:42Z |
last_indexed |
2023-09-18T20:18:42Z |
_version_ |
1777407961500483584 |