0% found this document useful (0 votes)
100 views

Type of Reference, Reference Citation & In-Text Citation Quoted Text Summary/Paraphrase of Quoted Text

The document discusses various steganography and steganalysis techniques. It summarizes several research papers on steganography algorithms and their properties such as compatibility with different file types, encryption methods used, and imperceptibility of embedded messages. It also discusses different types of steganalysis and compares encryption algorithms.

Uploaded by

Robert Escaro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views

Type of Reference, Reference Citation & In-Text Citation Quoted Text Summary/Paraphrase of Quoted Text

The document discusses various steganography and steganalysis techniques. It summarizes several research papers on steganography algorithms and their properties such as compatibility with different file types, encryption methods used, and imperceptibility of embedded messages. It also discusses different types of steganalysis and compares encryption algorithms.

Uploaded by

Robert Escaro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

University of Santo Tomas

Department of English
Institute of Information & Computing Sciences
English 108A - Technical Writing
SUMMARY & PARAPHRASE OF REFERENCES MATRIX
Type
of
Reference, Quoted Text
Reference Citation & In-Text
Citation

Summary/Paraphrase
Text

Research Journal

Steganography is the art and science of


Communicating in such a way that it
hides
the
existence
of
the
communication. Thus, steganography
hides the existence of data so that no
one can detect its presence. In
steganography the process of hiding
information
content
inside
any
multimedia content like image, audio,
video is referred as a Embedding For
increasing
the
confidentiality
of
communicating
data
both
the
techniques may be combined.

Steganography hides the existence of

Steganalysis is broadly classified into


two categories. One is meant for
Venkadahalam, N., & Anitha, R. breaking a specific steganography. The
(2012).
Blind
Image other one is universal steganalysis,
Steganalysis
Based
On which can detect the existence of hidden
message without knowing the details of

There are two types of Steganalysis,

Kour, J., & Verma, D. (2014).


Steganography Techniques A
Review Paper, International
Journal of Emerging Research in
Management
&
Technology
3(5), p.132. Retrieved March
12,
2015,
from
http://www.ermt.net/docs/paper
s/Volume_3/5_May2014/V3N5190.pdf

Research Journal

of

Quoted

communication, so that no one can


detect the presence of a message. It
embeds it into multimedia files like
image, audio and video.

one is for decoding a steganography.


The other is the universal one or blind
steganalysis (the more practical way). It

Contourlet
Transform,
International
Journal
on
Cryptology and Information
Security 2(3), p.77. Retrieved
March
12,
2015,
from
http://airccse.org/journal/ijcis/p
apers/2312ijcis07.pdf

steganography
algorithms
used. detects hidden message without the
Universal steganalysis is also known as
knowledge of stego algortihms used.
blind steganalysis and it is more
applicable and practicable.

Related Systems

Most of the steganographic algorithms


available today are suitable for a specific
image format and these algorithms
suffer from poor quality of the
embedded image. The proposed work
does not corrupt the images quality in
any form. The striking feature is that this
algorithm is suitable for almost all image
formats e.g. jpeg/jpg, Bitmap, TIFF and
GIFF. The entire process consists of
mainly two steps:

Research Journal

Most

steganographic

algorithms

are

compatible to certain file types only.


The algorithm should be compatible

Tresa, R., Babu, A., & T, S.


(2012).
A
Novel
Steganographic Scheme Based
On Hash Function Coupled With
AES
Encryption,
Advanced
Computing: An International
Journal
5(1),pp
27-28.
1. Embedding
Retrieved March 12, 2015, from 2. Extracting
http://airccse.org/journal/acij/pa
pers/5114acij03.pdf
The textual data entered by the user is
encrypted using AES algorithm. After
encryption, the encrypted data is stored
in the colour image by using a hash
function.

with the different file types. The process

Related Systems

AES

In
the
proposed
AES
based
steganography model, the strength of Sbox mapping and secrete key for
Research Journal
encrypting secrete image, improves
security and image quality compared to
Ramaiya, M., Hemrajani, N., & existing
algorithms.
All
of
the

should

consist

extracting

only.

of

embedding
Textual

and

data

is

encrypted by AES, and encrypted data


is stored on colour image by hashing.

based

steganography

model

using S-box mapping and secret key for


encrypting improves security and image
quality compared to other algorithms.

Saxena, A. (2013). Secured


Steganography Approach Using
AES, International Journal of
Computer Science Engineering
and Information Technology
Research 3(3), p.191. Retrieved
March
15,
2015,
from
http://www.academia.edu/4133
265/SECURED_STEGANOGRAPH
Y_APPROACH_USING_AES

cryptographic algorithms presented so Other algorithms such as DES and Triple


far have some problems. The earlier
DES have been proven to be too slow,
ciphers can be broken with ease on
modern computation systems. The DES easy to break or inefficient.
algorithm was broken in 1998 and Triple
DES turned out to be too slow for
efficiency as the DES algorithm was
developed for mid1970s hardware and does not produce
efficient software code. Triple DES has
three
rounds
as
DES
and
is
correspondingly slower. 64 bit block size
of triple DES and DES is not very
efficient and is questionable when it
comes to security

Related Systems

In Data communication, encryption


algorithm plays an important role. Our
research work surveyed the existing
encryption techniques like AES, DES and
RSA
algorithms
along
with
LSB
substitution technique. Those encryption
techniques are studied and analysed
well to promote the performance of the
encryption methods also to ensure the
security. Based on the experimental
result it was concluded that AES
algorithm consumes least encryption
and decryption time and buffer usage
compared to DES algorithm. But RSA
consume more encryption time and
buffer usage is also very high. We also
observed that decryption of AES
algorithm
is
better
than
other
algorithms. From the simulation result,

Research Journal
Padmavathi, B., & Kumari, S.
(2013).
A
Survey
on
Performance Analysis of DES,
AES and RSA Algorithm along
with
LSB
Substitution
Technique, International Journal
of Science and Research 2(4),
p.173 Retrieved March 12,
2015,
from
http://www.ijsr.net/archive/v2i4/
IJSRON120134.pdf

Different
tested

encryption
with

steganography

LSB

algorithms

are

substitution,

technique.

a
AES

algorithm gathered the least encryption


and

decryption

time,

its

decryption

technique is better than algorithms


compared to RSA and DES algorithms.

we evaluated that AES algorithm is


much better than DES and RSA
algorithm.
Related Systems Accuracy All the results displayed prove to be time
and
effective.
Also
the
of Stego-image and Original efficient
algorithm
is
tested
for
various
numbers
Image
of bits. For those values of bits, Mean
Square Error (MSE) and Peak Signal to
Research Journal
Noise Ratio (PSNR) are calculated and
plotted. Experimental results show that
Chadha, A., Satam, N., Sood, the
stego
image
is
visually
R., & Bade, D. (2013). An indistinguishable from the original cover
Efficient Method for Image and image when n<=4, because of better
Audio Steganography Using PSNR which is achieved by this
technique. The final results obtained
Least Significant Bit (LSB)
after steganography
Substitution,
International process does not reveal presence of any
Journal of Computer Application hidden message, thus qualifying the
77(13), p.37. Retrieved March criteria of imperceptible message
12,
2015,
from
http://arxiv.org/ftp/arxiv/papers/
1311/1311.1083.pdf

The various bits in images are tested

Research Journal

Other known encryption algorithms will

A Modified AES Based


Algorithm for Image
Encryption
Baganne, A., Machhout, M.,
Tourki, R., & Zeghid, M. (n.d.).
A Modified AES Based

The AES is extended to support a key


stream generator for image encryption
which can overcome the problem of
textured zones existing in other known
encryption algorithms. Detailed analysis
has shown that the new scheme offers
high security, and can be realized easily
in both hardware and software. The key
stream generator has an important
influence
on
the
encryption

with

MSE

and

PSNR.

After

experimentation results show that the


stego image is visually indistinguishable
from the original cover image given a
certain value of n. The final stego image
has

no

presence

of

any

hidden

message.

be

solved

from

the

problems

of

textured zone analysis with AES as an


intermediary

to

support

as

key

stream for image encryption. The key


stream generator also possesses a
valuable significance on the encryption

Algorithm for Image


Encryption. International
Journal of Computer Science
and Engineering, 1(1), 74.

performance.

both hardware and software security


standards.

(Baganne, Machhout, Tourki, &


Zeghid, n.d.)
Research Journal
A New Image Encryption
Approach using The Integration
of A Shifting Technique and
The AES Algorithm
Abugharsa, A., Basari, A., &
Almangush, H. (2012). A New
Image Encryption Approach
using The Integration of A
Shifting Technique and The
AES Algorithm. International
Journal of Computer
Applications, 42(9), 38-45.
(Abughars,
Basari,
Almangush, 2012)
Research Article
Exploring Steganography:
Seeing the Unseen
Jajodia, S. & Johnson, N.F..
(2008). Exploring
Steganography: Seeing the

performance based on the analyses on

It is very important to impact the


correlation among image pixels in a
plain image to increase the security
level of the encrypted image. The
proposed technique showed that an
inverse relationship exists between the
number of blocks and correlation, while
there exists a direct relationship
between the number of blocks and
entropy. The proposed algorithm is
expected to show good performance,
uniform distribution in a histogram, a
low correlation and a high entropy.

Stressing out the relationship of bits in


the image pixels helps to raise the
security level of the encrypted image.
The proposed technique demonstrates
the equivalence of using the number of
blocks and another direct relationship
among

the

number

of

blocks

and

entropy. Optimal results are expected


to run in uniform distribution within a
histogram showing low correlation and
high entropy.

&
Steganography is the art of hiding
information in ways that prevent the
detection of hidden messages. It
includes a vast array of secret
communications methods that conceal
the message's very existence. These
methods
include
invisible
inks,
microdots,
character
arrangement,
digital signatures, covert channels, and

Steganography is the art of concealing


confidential

information

communication

that

inhibit

and
the

detection of hidden messages. This


technique

involves

collection

of

covert communication methods that

Unseen. IEEE, 31(2), 26-34.

spread spectrum communications.

establishes

to

cloak

the

intended

message for security. Methods that are

(Jajodia & Johnson, 2008)

used include the usage of invisible inks,


microdots,

character

arrangement,

digital signatures, covert channels, and


Book
Digital Watermarking and
Steganography: Fundamentals
and Techniques
Shih, F. (2007). Digital
Watermarking and
Steganography: Fundamentals
and Techniques (p. 33). Boca
Raton, Florida: CRC Press.
(Shih, 2007)

Digital watermarking has been


proposed as a suitable tool for
identifying the source, creator, owner,
distributor, or authorized consumer of a
document or an image. It can also be
used to detect a document or an image
that has been illegally distributed and
modified. It is used for such information
security as copyright protection, data
authentication, broadcast monitoring,
and covert communication. The
watermark is embedded into a host
image in such a way that the embedded
watermark in such a way that
embedding-induced distortion is too
small to be noticed.

spread spectrum communications.


Digital watermarking is a very useful
tool for copyrights of various electronic
data and media. It could be used to
determine the author, source, creator
and even the distributer of such media.
It could also be used to identify if the
stolen media was illegally modified and
distributed. A watermark may be a
secondary image that can be used as
an under layer on the original image to
provide a means for protection of the
image. It primarily acts as a digital
signature for the creator to have a
sense of ownership and authenticity for
the use of copyright protection and

Research Journal
Blind Image Steganalysis
Based

The obvious purpose of steganalysis is


to collect sufficient evidence about the
presence of embedded message and to
break the security of the carrier.

should be designed to be invisible.


Steganalysis is the art and science of
detecting

the

hidden

message.

Its

purpose is to collect sufficient evidence

On Contourlet Transform
(Aritha & Natarahan, 2012)
Natarajan, V., & Anitha, R.
(2012).
Blind
Image
Steganalysis
Based
on
Contourlet
Transform.
International
Journal
on
Cryptography and Information
Security, 2(3), 77.

Steganalysis is broadly classified into


two categories. One is meant for
breaking a specific steganography. The
other one is universal steganalysis,
which can detect the existence of
hidden message without knowing the
details of steganography algorithms
used. Universal steganalysis is also
known as blind steganalysis and it is
more applicable and practicable than
the specific steganalysis.

about

the

presence

of

embedded

message and to break the security of


the carrier. There are two classifications
of steganalysis. The first one is meant
meant

for

breaking

steganography.
universal
detect

steganalysis

the

message

The

existence
without

specific

other
,
of

one

which
a

knowing

is
can

hidden
the

steganographic algorithm used. It is


also known as blind Steganalysis and is
Research Journal
Simulation of Image
Encryption using AES
Algorithm
Karthigaikumar, P., & Rasheed,
S. (2011). Simulation of Image
Encryption using AES
Algorithm. Computational
Science - New Dimensions and
Perspectives, 166.
(Karthigaikumar
2011)

&

Rasheed,

The urgency for secure exchange of


digital data resulted in large quantities
of different encryption algorithms which
are evaluated on the basis of
throughput, speed of operation and area
requirements. There are mainly two
types of cryptographic algorithms:
symmetric and asymmetric algorithms.
Advanced Encryption Standard (AES)
uses an identical key for the sender and
receiver; both to encrypt the message
text and decrypt the cipher text.

more applicable and practicable.


The demand for security of digital data
such as images resulted in different
types of encryption algorithms whose
performances are evaluated by basis of
throughput, speed of operation and
area requirements. There are mainly
two types of cryptographic algorithms:
Symmetric and Asymmetric algorithms.
Advanced Encryption Standard (AES) is
an example of Symmetric Algorithms, it
has a key for the sender and receiver,
both to encrypt and decrypt text or
data.

You might also like