Journal of Engineering and Applied Sciences

Year: 2020
Volume: 15
Issue: 1
Page No. 247 - 251

A Comparison of Steganography in the GIF Image using LSB and Spread Spectrum Method

Authors : Andika Amirulhaqi, Tito Waluyo Purboyo and Ratna Astuti Nugrahaeni

References

Akhtar, N., V. Ahamad and H. Javed, 2017. A compressed LSB steganography method. Proceedings of the 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), February 9-10, 2017, IEEE, Ghaziabad, India, ISBN:978-1-5090-6219-5, pp: 1-7.

Bagaskara, J.A. and T.W. Purboyo, 2016. Analysis and implementation of steganography on JPEG using LSB and spread spectrum method. ARPN. J. Eng. Appl. Sci., 14: 1244-1248.
Direct Link  |  

Bagaskara, J.A., T.W. Purboyo and R.A. Nugrahaeni, 2017. Analysis of JPEG image steganography using spread spectrum method. Intl. J. Appl. Eng. Res., 12: 13944-13950.
Direct Link  |  

Bashardoost, M., G.B. Sulong and P. Gerami, 2013. Enhanced LSB image steganography method by using knight tour algorithm, vigenere encryption and LZW Compression. Intl. J. Comput. Sci. Issues, 10: 221-227.
Direct Link  |  

Chandramouli, R. and K.P. Subbalakshmi, 2003. Active steganalysis of spread spectrum image steganography. Proceedings of the 2003 International Symposium on Circuits and Systems ISCAS’03 Vol. 3, May 25-28, 2003, IEEE, Bangkok, Thailand, pp: 830-833.

Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
CrossRef  |  Direct Link  |  

Dewangga, I.G.A.P., T.W. Purboyo and R.A. Nugrahaeni, 2018. Comparison of digital image steganography based on techniques. J. Eng. Appl. Sci., 13: 4442-4446.
CrossRef  |  Direct Link  |  

Fridrich, J., M. Goljan and R. Du, 2001. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 8: 22-28.
CrossRef  |  Direct Link  |  

Gkizeli, M., D.A. Pados and M.J. Medley, 2007. Optimal signature design for spread-spectrum steganography. IEEE. Trans. Image Process., 16: 391-405.
CrossRef  |  Direct Link  |  

Juzar, M.T. and R. Munir, 2016. Message hiding in animated GIF using multibit assignment method. Proceedings of the 2016 International Symposium on Electronics and Smart Devices (ISESD), November 29-30, 2016, IEEE, Bandung, Indonesia, ISBN:978-1-5090-3841-1, pp: 225-229.

Marvel, L.M., C.G. Boncelet and C.T. Retter, 1999. Spread spectrum image steganography. IEEE Trans. Image Process., 8: 1075-1083.
CrossRef  |  Direct Link  |  

Marvel, L.M., C.G. Boncelet and C.T. Retter, 1999. Spread spectrum image steganography. IEEE. Trans. Image Proc., 8: 1075-1083.
CrossRef  |  PubMed  |  Direct Link  |  

Morkel, T., J.H. Eloff and M.S. Olivier, 2005. An overview of image steganography. Proceedings of the 5th Annual Conference on Information Security South Africa, June 29-July 1, 2005, ISSA, Sandton, South Africa, pp: 1-11.

Morkel, T., J.H.P. Eloff and M.S. Olivier, 2005. An overview of image steganography. Proceedings of the 5th Annual Information Security South Africa Conference, June 29-June 1, Sandton, South Africa, pp: 1-12.

Munir, R., 2016. Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images. Proceedings of the 2016 2nd International Conference on Science in Information Technology (ICSITech), October 26-27, 2016, IEEE, Balikpapan, Indonesia, ISBN:978-1-5090-1722-5, pp: 58-62.

Walia, E., P. Jain and Navdeep, 2010. An analysis of LSB and DCT based steganography. Global J. Comput. Sci. Technol., 10: 4-8.
Direct Link  |  

Xie, C., Y. Cheng and Y. Chen, 2010. Spread-spectrum steganalysis and PN sequence estimation. Proceedings of the 2010 3rd International Congress on Image and Signal Processing Vol. 9, October 16-18, 2010, IEEE, Yantai, China, ISBN:978-1-4244-6513-2, pp: 4143-4147.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved