EN
An Investigation on Information Hiding Tools for Steganography
Abstract
In this paper, information about steganographic methods and tools which are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as achievement on data hiding, used methods, types of hidden data and cover media are examined.
Keywords
References
- C. Ming, Z. Ru, N. Xin xin and Y. Yixian, “Analysis of current steganography tools: classifications & features”, International Conference on Intelligent Information Hid ing and Multimedia Signal Processing, 2006. Analyzing steganography softwares, URL: http://www.guillermito2.net/stegano/, Last accessed: July
- N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digita l Watermarking, Artech House, Inc., Norwood, 2000.
- E. M ichaud, “Current steganography tools and methods”, SANS Penetration Testing, April 2003.
- A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Dig ital image steganography: survey and analysis of current methods”, Signal Processing, 2010, pp. 727-752, doi:10.1016/ j.sigpro.2009.08.010.
- R. Zax and F. Adelstein, “FAUST: Forensic artifacts of uninstalled steganography tools”, Digital Investigation, , pp. 25-38, doi:10.1016/ j.diin.2009.02.002.
- B. Dunbar, “A detailed look at steganographic techniques and their use in an open-systems environment”, SANS Institute Reading Room, 2002.
- P. Hayati, V. Potdar and E. Chang, "A survey of steganographic and steganalytic tools for the digital forensic investigator", In Workshop of Informat ion Hid ing and Digital Watermarking, 2007.
- H. Mathkour, B. Al-Sadoon and A. Touir, "A new image steganography technique", Wireless Co mmunications, Networking and Mobile Co mputing, 2008. WiCOM '0 8. th International Conference, pp.I-4, 12-14 Oct. 2008. Steganography http://www.jjtc.com/ Steganography/tools.html, accessed: May 2013. software, URL: Last Steganography, Wikipedia, URL: http://en.wikipedia.org/wiki/Steganography, Last accessed: June 2013
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Publication Date
September 28, 2014
Submission Date
January 30, 2016
Acceptance Date
-
Published in Issue
Year 2014 Volume: 3 Number: 3
APA
Das, R. (2014). An Investigation on Information Hiding Tools for Steganography. International Journal of Information Security Science, 3(3), 200-208. https://izlik.org/JA57ZK49KT
AMA
1.Das R. An Investigation on Information Hiding Tools for Steganography. IJISS. 2014;3(3):200-208. https://izlik.org/JA57ZK49KT
Chicago
Das, Resul. 2014. “An Investigation on Information Hiding Tools for Steganography”. International Journal of Information Security Science 3 (3): 200-208. https://izlik.org/JA57ZK49KT.
EndNote
Das R (September 1, 2014) An Investigation on Information Hiding Tools for Steganography. International Journal of Information Security Science 3 3 200–208.
IEEE
[1]R. Das, “An Investigation on Information Hiding Tools for Steganography”, IJISS, vol. 3, no. 3, pp. 200–208, Sept. 2014, [Online]. Available: https://izlik.org/JA57ZK49KT
ISNAD
Das, Resul. “An Investigation on Information Hiding Tools for Steganography”. International Journal of Information Security Science 3/3 (September 1, 2014): 200-208. https://izlik.org/JA57ZK49KT.
JAMA
1.Das R. An Investigation on Information Hiding Tools for Steganography. IJISS. 2014;3:200–208.
MLA
Das, Resul. “An Investigation on Information Hiding Tools for Steganography”. International Journal of Information Security Science, vol. 3, no. 3, Sept. 2014, pp. 200-8, https://izlik.org/JA57ZK49KT.
Vancouver
1.Resul Das. An Investigation on Information Hiding Tools for Steganography. IJISS [Internet]. 2014 Sep. 1;3(3):200-8. Available from: https://izlik.org/JA57ZK49KT