Document Type : Research Paper

Author

University of Anbar - College of computer

10.37652/juaps.2015.124504

Abstract

Steganography is the art of hiding information in different cover media, then sending & displaying the hidden information especially in public places, Therefore, different methods have been proposed so far for hiding information. In this paper new method was proposed called keyboard method because it works in manner like the keyboard. It is insure that no change on image which must send to another side.

Keywords

Main Subjects

[1].F.Johnson, SushilJajodia, Exploring Steganography Seeing the Unseen, George Mason University, IEEE, 1998.
[2]. J. Juan, M.Jesús, SLSB: Improving the Steganographic Algorithm LSB, Universidad Nacional de Educación a Distancia (Spain)
[3]. Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
 [4]. Chandramouli, R., Kharrazi, M. &Memon, N., “Image steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003.
[5]. Chandramouli, R., Kharrazi, M. &Memon, N., “Image steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003..
[6] Anderson, R.J. &Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areasin Communications, May 1998.
[7] Currie, D.L. & Irvine, C.E., “Surmounting the effects of lossy compression on Steganography”, 19th National Information Systems Security Conference, 1996
[8]. Wikipedia,“Steganography”,  2013.
[9]. MohamedAmin&Subariah Ibrahim, “Information hiding using steganographyApproach” , university technology Malaysia, 2003.
[10]. PhD. Hasan Demirel, “Digital Image Processing” , EE-583

[11].Wikipedia, “Digital image”, 2012.

[12]. Jonathan Sachs, “Digital Image Basics”, 1999.
[13]. Arvind Kumar, Pooja. Km, Steganography- A Data Hiding Technique International Journal of Computer Applications, Volume 9– No.7, November 2010.
[14].Jonathan Cummins, Patrick Diskin, “Steganography And Digital Watermarking”, 2004.
 [15]. Shashikala Channalli, “Steganography An Art of Hiding Data ”, International Journal on Computer Science and Engineering Vol.1(3), 2009.
[16].  Das Soumyendu, Sugata Sanyal, “Steganography and Steganalysis: Different Approaches  ”,
[17] MP3Stego: Hiding Text in MP3 Files - Mark Noto,The Information Security Reading Room, SANS Institute 2001
[18] Digital video steganalysis exploiting collusion sensitivity- Udit Budhiaa and Deepa Kundur Sensors, Command Control, Communications and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, Edward M.Carapezza, ed., Proc. SPIE (vol. 5403), Orlando, Florida, April 2004.http://www.ece.tamu.edu/~deepa/pdf/BudKun04.pdf
[19] Methods of Audio Steganography, Internet Publication on www.snotmonkey.com http://www.snotmonkey.com/work/school/405/methods.html
[20]. Ali Al-Ataby, Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform”, International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010.
[21]. Arvind Kumar, Km. Pooja, “Steganography- A Data Hiding Technique”, International Journal of Computer Applications, Volume 9– No.7, November 2010