Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Technical Review on Comparison and Estimation of Steganographic Tools


Affiliations
1 BMIIT, India
     

   Subscribe/Renew Journal


Steganography is technique of hiding a data under cover media using different steganography tools. Image steganography is hiding of data (Text/Image/Audio/Video) under a cover as Image. This review paper presents classification of image steganography and the comparison of various Image steganography tools using different image formats. Analyzing numerous tools on the basis of Image features and extracting the best one. Some of the tools available in the market were selected based on the frequent use; these tools were tested using the same input on all of them. Specific text was embedded within all host images for each of the six Steganography tools selected. The results of the experiment reveal that all the six tools were relatively performing at the same level, though some software performs better than others through efficiency. And it was based on the image features like size, dimensions, and pixel value and histogram differentiation.

Keywords

Information Security, Carrier, Domain, Privacy, Secret Text, Information Hiding, Cryptography, Steganography, Steganography Tools.
Subscription Login to verify subscription
User
Notifications
Font Size



  • A Technical Review on Comparison and Estimation of Steganographic Tools

Abstract Views: 568  |  PDF Views: 2

Authors

Preeti P. Bhatt
BMIIT, India
Rakesh R. Savant
BMIIT, India

Abstract


Steganography is technique of hiding a data under cover media using different steganography tools. Image steganography is hiding of data (Text/Image/Audio/Video) under a cover as Image. This review paper presents classification of image steganography and the comparison of various Image steganography tools using different image formats. Analyzing numerous tools on the basis of Image features and extracting the best one. Some of the tools available in the market were selected based on the frequent use; these tools were tested using the same input on all of them. Specific text was embedded within all host images for each of the six Steganography tools selected. The results of the experiment reveal that all the six tools were relatively performing at the same level, though some software performs better than others through efficiency. And it was based on the image features like size, dimensions, and pixel value and histogram differentiation.

Keywords


Information Security, Carrier, Domain, Privacy, Secret Text, Information Hiding, Cryptography, Steganography, Steganography Tools.

References