Research Papers On Steganography Essays On Hope And Other Dangerous Pursuits
Steganography includes the concealment of information within computer files.
In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.
In 20, Yongfeng Huang and Shanyu Tang devised new steganographic algorithms that use codec parameters as cover object to realise real-time covert Vo IP steganography.
Their findings were published in IEEE Transactions on Information Forensics and Security.
Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text.
For example, the hidden message may be in invisible ink between the visible lines of a private letter.
 Amin, Mohamed “Muhalim and Ibrahim, Subariah and Salleh, Mazleena and Katmin, Mohd rozi (2003) Information hiding using steganography. "Steganography Algorithm to hide secret message inside an Image." ar Xiv preprint ar Xiv: 1112.2809 (2011).
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic.
"Digital image Steganalysis for computer forensic investigation." Computer Science and Information Technology (CSIT) (2012): 161-168..  Hitesh Singh, Pradeep Kumar Singh, Kriti saroha “A Survey on Text Based Steganography” Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development, February 26 – 27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and Management, Ne w Delhi.  Dutta, Poulami, Debnath Bhattacharyya, and Tai-hoon Kim.
"An Integrated Image Steganography System with Improved Image Quality." Applied Mathematical Sciences 7.71 (2013): 3545-3553. "A Robust Image Steganography using DWT Difference Modulation (DWTDM)." International Journal of Computer network & Information Security 4.7 (2012).. Bennett, “Linguistic Steganography: survey, analysis, and robustness concerns for hiding information in text” center for Education and Research in Information Assurance and Security, Purdue University 2004. "Audio Steganography: A Survey on Recent Approaches." World Applied Programming 2.3 (2012): 202-205..
"A Survey on various types of Steganography and Analysis of Hiding Techniques", International Journal of Engineering Trends and Technology (IJETT), V11(8),388-3. Under this assumption, if the feature is visible, the point of attack is evident, thus the here goal is conceal to the existence of the embedded data . " International Journal of Soft Computing and Engineering (IJSCE) ISSN (2012): 2231-2307.  Sohag, Saeed Ahmed, Md Kabirul Islam, and Md Baharul Islam.
published by seventh sense research group Digital Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files.  Yuk Ying Chung, fang Fei Xu , “Development of video watermarking for MPEG2 video” City university of Hong Kong , IEEE 2006. "Image Steganography Using LSB and Edge–Detection Technique. Intertional Journal of Computer Application volume 7-No.9 October 2010.