Tags: Science And Technology Essay And Speech CompetitionBoston Consulting Group Case StudyDissertation Proposal Construction LawEssay Emotional Intelligence WorkplaceHistory Of Descriptive EssaySample Outline Format For Research PaperBusiness Plan Nail SalonApa Rubric Research Paper
Since the era of evolving network applications, steganography research has shifted from image steganography to steganography in streaming media such as Voice Over Internet Protocol (Vo IP). developed a data hiding technique leading to compressed forms of source video signals on a frame-by-frame basis.is the first ever effort to improve the codebook partition by using Graph theory along with Quantization Index Modulation in low bit-rate streaming media.Published by Foundation of Computer Science, New York, USA.
"Digital image Steganalysis for computer forensic investigation." Computer Science and Information Technology (CSIT) (2012): 161-168..  Hitesh Singh, Pradeep Kumar Singh, Kriti saroha “A Survey on Text Based Steganography” Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development, February 26 – 27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and Management, Ne w Delhi.  Dutta, Poulami, Debnath Bhattacharyya, and Tai-hoon Kim.
"An Integrated Image Steganography System with Improved Image Quality." Applied Mathematical Sciences 7.71 (2013): 3545-3553. "A Robust Image Steganography using DWT Difference Modulation (DWTDM)." International Journal of Computer network & Information Security 4.7 (2012).. Bennett, “Linguistic Steganography: survey, analysis, and robustness concerns for hiding information in text” center for Education and Research in Information Assurance and Security, Purdue University 2004. "Audio Steganography: A Survey on Recent Approaches." World Applied Programming 2.3 (2012): 202-205..
This is totally review paper, in which we provide the comparison of available steganography technology hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography.  Shashikala Channalli, Ajay Jadhav, “Steganography An Art of Hiding Data” International Journal on Computer Science and Engineering Vol.1(3), 2009, 137-141  Morkel, Tayana, Jan HP Eloff, and Martin S. "A Novel Approach for Image Steganography Using Dynamic Substitution and Secret key. "A Review of Comparison Techniques of Image Steganography. “An Integrated Image Steganography System with Improved Image Quality." Applied Mathematical Sciences 7.71 (2013): 3545-3553.. "A Robust Image Steganography using DWT Difference Modulation (DWTDM)." International Journal of Computer Network & Information Security 4.7 (2012) .
The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego -image is transformed from spatial domain to the frequency domain. Artz, Donovan. " Global Journal of Computer Science and Technology 13.4 (2013) .  Saddaf rubab and M Younus article: Improved Image Steganography Technique for Colored Images using Wavelet Transform.
The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization. In communities with social or government taboos or censorship, people use cultural steganography—hiding messages in idiom, pop culture references, and other messages they share publicly and assume are monitored.
This relies on social context to make the underlying messages visible only to certain readers.
The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change.
Histiaeus sent a message to his vassal, Aristagoras, by shaving the head of his most trusted servant, "marking" the message onto his scalp, then sending him on his way once his hair had regrown, with the instruction, "When thou art come to Miletus, bid Aristagoras shave thy head, and look thereon." Additionally, Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface.
In 20, Yongfeng Huang and Shanyu Tang devised new steganographic algorithms that use codec parameters as cover object to realise real-time covert Vo IP steganography.
Their findings were published in IEEE Transactions on Information Forensics and Security.