Abstract: With digitization, data hiding has become more important than ever. Steganography forms an undisputable tool to attain privacy during data sharing. Steganography is the art and science of hiding data within seemingly innocuous data so as to not draw suspicion. This paper provides a survey on steganography, its advantage over cryptography, the types of digital media over which steganography can be applied and the progress of steganographic methods and recent trends in steganography. Images, video, text, audio are the digital media which serve as cover-media through which secret data may be transmitted often by exchanging stego-key..
Keywords: cover-media, data hiding, digital media, steganographic technique, stego-key
[1] T. K. Hazra, R. Ghosh, S. Kumar, S. Dutta and A. K. Chakraborty, "File encryption using Fisher-Yates Shuffle," 2015 International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, BC, 2015, pp. 1-7. doi: 10.1109/IEMCON.2015.7344521
[2] T. K. Hazra, S. R. Chowdhury and A. K. Chakraborty, "Encrypted Image Retrieval System: A machine learning approach," 2016 IEEE 7thAnnual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, 2016, pp. 1-6.doi: 10.1109/IEMCON.2016.7746351
[3] T. K. Hazra and S. Bhattacharyya, "Image encryption by blockwise pixel shuffling using Modified Fisher Yates shuffle and pseudorandom permutations," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON),Vancouver, BC, 2016, pp. 1-6. doi: 10.1109/IEMCON.2016.7746312
[4] T. K. Hazra, N. Kumari, Monica, S. Priya and A. K. Chakraborty,"Image encryption and decryption using phase mask over sinusoidal single and cross grating," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference(IEMCON), Vancouver, BC, 2016, pp. 1-6. doi:10.1109/IEMCON.2016.7746317
[5] N. U. Sheikh, T. K. Hazra, H. Rahman, K. Mustafi and A. K. Chakraborty, "Multi-variable bijective mapping for secure encryption and decryption," 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, 2017, pp. 338-345. doi: 10.1109/IEMECON.2017.8079619..