Articles via Databases
Articles via Journals
Online Catalog
E-books
Research & Information Literacy
Interlibrary loan
Theses & Dissertations
Collections
Policies
Services
About / Contact Us
Administration
Littman Architecture Library
This site will be removed in January 2019, please change your bookmarks.
This page will redirect to https://digitalcommons.njit.edu/theses/411 in 5 seconds

The New Jersey Institute of Technology's
Electronic Theses & Dissertations Project

Title: A study of steganography and steganalysis
Author: Nalla, Nisant
View Online: njit-etd2006-012
(vii, 45 pages ~ 2.4 MB pdf)
Department: Department of Electrical and Computer Engineering
Degree: Master of Science
Program: Electrical Engineering
Document Type: Thesis
Advisory Committee: Shi, Yun Q. (Committee chair)
Shih, Frank Y. (Committee member)
Zhou, MengChu (Committee member)
Date: 2006-01
Keywords: Steganography
Steganalysis
Information security
Availability: Unrestricted
Abstract:

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Steganalysis is the study of methods to detect the presence of hidden messages. The Steganography and Steganalysis are very much interdependent. The people in the Steganography domain try to develop stronger methods to hide data in different media. This spurs the discovery of new steganalysis methods which can break these Steganography methods. This is vital for the development of these fields. The internet has been growing by leaps and bounds. There is an increasing need for information security. It has been rumoured that some of the anti social organizations have been using Internet to send and receive messages covertly. This is a serious problem before all the law enforcement agencies. This is one reason why steganographic and steganalytic techniques are being studied. The applications for Steganography are not just limited to military purposes. It can be used by businesses to tackle with copyright infringements.

This work is a study of the some of the Steganography and Steganalysis techniques which are considered to be the best. In this work experiments were done with Steganography methods F5, Outguess and the Model based methods which are considered the most secure steganographic schemes at present. The Steganalysis methods used here are the NJIT's 39D and 78D methods which are based on statistical moments of characteristic functions of wavelet subbands for the test images and prediction error images.


If you have any questions please contact the ETD Team, libetd@njit.edu.

 
ETD Information
Digital Commons @ NJIT
Theses and DIssertations
ETD Policies & Procedures
ETD FAQ's
ETD home

Request a Scan
NDLTD

NJIT's ETD project was given an ACRL/NJ Technology Innovation Honorable Mention Award in spring 2003