Beruflich Dokumente
Kultur Dokumente
LITERATURE SURVEY
steganographic system involves reversible texture Literature survey is the most significant step in
synthesis and presents a design and implementation software improvement process. Before developing
of weaving a the texture synthesis process into the tool it is necessary to define the time factor
steganography to conceal the secret message. Texture economy and company power. Once these things are
synthesis is the method of building a large digital satisfied, then the next step is to define which
image from a small digital sample image by taking operating system and semantic can be used for
advantage of its structural content. A typical developing the tool. Once the programmers start
steganographic application includes covert building the tool the programmer wanta lot of
communication between two parties whose presence external support. This support can be achieved from
is anonymous to a probable attacker and whose senior programmers, from book or from websites.
success depends on detecting the existence of this Before constructing the system the above thoughts
communication. We implement how to secure the are taken into account for developing the proposed
communication over the medium. We can implement system. IN PAPER[1]A.E.Mustafa et al., presents a
patch based algorithm that may conceal source new Steganography technique based on the spatial
texture image and embeds secret message through the domain for encoding additional information in an
process of texture synthesis. picture by making small alterations to its pixels. The
proposed technique concentrations on one specific
Keywords- Steganography, stego image, Secret key, popular technique, Least Significant Bit (LSB)
Texture Synthesis, Reversible texture Synthesis Embedding. In place of using the LSB-1 of the cover
for embedding the message, LSB-2 has been used to
I. INTRODUCTION increase the robustness. In paper [2] M.Zamani et
A steganography can be defined as the art and science al.,examines the opportunity of usage of Genetic
of indistinguishable communication. The word Algorithms (GA) for data hiding in digital images.
steganography derives from the Greek steganos, Two spatial domain data hiding approaches are
implication covered or secret, and graphy, implication planned where GA is used distinctly for (i)
writing or drawing. Therefore, steganography improvement in discovery and (ii) optimum
literally means that covered writing. Information and imperceptibility of secreted data in digital pictures
communication technology has grown rapidly. respectively. In paper [3]G.S.Sarvanthi et al.,
Internet is the most general communication standard discussed a new technique of information hiding in
nowadays. But message transmission over the digital picture in spatial domain. In this technique we
internet is facing some difficulties such as files use Plane Bit Substitution Method (PBSM) technique
security, copyright control etc. So we need secret in which communication bits are embedded into the
communication methods. Steganography place an pixel value(s) of an image.In paper [4] E.Levina et
important role in information security. The origin of al., presents a nonparametric algorithm for
steganography is traced back to ancient civilization. bootstrapping a stationary unplanned ground and
The oldenEgyptians communicated covertly using the shows certain consistency possessions of the
hieroglyphic language, a sequence of symbols algorithm for the case of mixing unplanned grounds.
representative a message. The message appearances Kasithangam et al., International Journal of
as if it is a sketch of a picture although it may hold a Advanced Research in Computer Science and
hidden message. Software Engg. 6(3), March - 2016, pp. 498-501
In paper [5] Michael F.Cohen et al., discusses the
usage of Wang Tiles for picture and texture
generation as initially accessible and creating large
regions of nonperiodic texture, point circulations or
geometry can be professionally done at runtime by
assembling a tiling of the plane using a minor set of
Wang tiles. The technique contains filling a minor
set of Wang Tiles with texture, Poisson point
deliveries or geometry and non-periodically roofing
the horizontal to stochastically produce a continuous
representation.In paper [6] Hirofumi Otori et al.,
suggests a new kind of image coding technique using
texture image synthesis. The textured code delivers
the conservative bar code with an aesthetic demand
Fig 1:Steganographic Technique and is used for tagging data onto actual texture
things, which can form a basis for abundant mobile
data communications. 4.1.2 Message oriented texture synthesis process:
We have now to produce an index table and
III. PREVIOUS WORK composition image, and have pasted basis patches
The existing work in the steganography using pixel straight into the workbench. We will embed our
based technique produce the synthesized image pixel secret message through the message oriented texture
by pixel and practices spatial neighborhood synthesis to produce the final stego synthetic.
evaluations to select the most comparable pixel in a
model texture as the production pixel. Since each
production pixel is regulated by the already
synthesized pixels, an any incorrectly synthesized
pixels during the procedureinspiration the rest of the
result producing propagation of error.