An Investigation on Information Hiding Tools for Steganography

Volume: 3 Number: 3 September 28, 2014
EN

An Investigation on Information Hiding Tools for Steganography

Abstract

In this paper, information about steganographic methods and tools which are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as achievement on data hiding, used methods, types of hidden data and cover media are examined.

Keywords

References

  1. C. Ming, Z. Ru, N. Xin xin and Y. Yixian, “Analysis of current steganography tools: classifications & features”, International Conference on Intelligent Information Hid ing and Multimedia Signal Processing, 2006. Analyzing steganography softwares, URL: http://www.guillermito2.net/stegano/, Last accessed: July
  2. N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digita l Watermarking, Artech House, Inc., Norwood, 2000.
  3. E. M ichaud, “Current steganography tools and methods”, SANS Penetration Testing, April 2003.
  4. A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Dig ital image steganography: survey and analysis of current methods”, Signal Processing, 2010, pp. 727-752, doi:10.1016/ j.sigpro.2009.08.010.
  5. R. Zax and F. Adelstein, “FAUST: Forensic artifacts of uninstalled steganography tools”, Digital Investigation, , pp. 25-38, doi:10.1016/ j.diin.2009.02.002.
  6. B. Dunbar, “A detailed look at steganographic techniques and their use in an open-systems environment”, SANS Institute Reading Room, 2002.
  7. P. Hayati, V. Potdar and E. Chang, "A survey of steganographic and steganalytic tools for the digital forensic investigator", In Workshop of Informat ion Hid ing and Digital Watermarking, 2007.
  8. H. Mathkour, B. Al-Sadoon and A. Touir, "A new image steganography technique", Wireless Co mmunications, Networking and Mobile Co mputing, 2008. WiCOM '0 8. th International Conference, pp.I-4, 12-14 Oct. 2008. Steganography http://www.jjtc.com/ Steganography/tools.html, accessed: May 2013. software, URL: Last Steganography, Wikipedia, URL: http://en.wikipedia.org/wiki/Steganography, Last accessed: June 2013

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Publication Date

September 28, 2014

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2014 Volume: 3 Number: 3

APA
Das, R. (2014). An Investigation on Information Hiding Tools for Steganography. International Journal of Information Security Science, 3(3), 200-208. https://izlik.org/JA57ZK49KT
AMA
1.Das R. An Investigation on Information Hiding Tools for Steganography. IJISS. 2014;3(3):200-208. https://izlik.org/JA57ZK49KT
Chicago
Das, Resul. 2014. “An Investigation on Information Hiding Tools for Steganography”. International Journal of Information Security Science 3 (3): 200-208. https://izlik.org/JA57ZK49KT.
EndNote
Das R (September 1, 2014) An Investigation on Information Hiding Tools for Steganography. International Journal of Information Security Science 3 3 200–208.
IEEE
[1]R. Das, “An Investigation on Information Hiding Tools for Steganography”, IJISS, vol. 3, no. 3, pp. 200–208, Sept. 2014, [Online]. Available: https://izlik.org/JA57ZK49KT
ISNAD
Das, Resul. “An Investigation on Information Hiding Tools for Steganography”. International Journal of Information Security Science 3/3 (September 1, 2014): 200-208. https://izlik.org/JA57ZK49KT.
JAMA
1.Das R. An Investigation on Information Hiding Tools for Steganography. IJISS. 2014;3:200–208.
MLA
Das, Resul. “An Investigation on Information Hiding Tools for Steganography”. International Journal of Information Security Science, vol. 3, no. 3, Sept. 2014, pp. 200-8, https://izlik.org/JA57ZK49KT.
Vancouver
1.Resul Das. An Investigation on Information Hiding Tools for Steganography. IJISS [Internet]. 2014 Sep. 1;3(3):200-8. Available from: https://izlik.org/JA57ZK49KT