Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2019, International Journal of Scientific Research in Computer Science, Engineering and Information Technology
https://doi.org/10.32628/CSEIT119548…
6 pages
1 file
Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So, the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend recipient, suspects the existence of the message, a form of security through obscurity. Hiding Secret Data Using Image Steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as image file. In this paper we mainly discuss different types of image steganographic methods, advantages and disadvantages. We focus in this paper on Hiding Secret Data Using Image Steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital image steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. The primary goal of steganography is to reliably send hidden information secretly, not merely to obscure its presence. Steganography in today’s computer era is considered a sub-discipline of data communication security domain. Lately, new directions based on steganographic approaches started to emerge to ensure data secrecy. Rather than as a substitute to existing solutions, these approaches could achieve better data secrecy if combined with conventional security techniques. Modern techniques of steganography exploit the characteristics of digital media by utilizing them as carriers (covers) to hold hidden information.
international journal for research in applied science and engineering technology ijraset, 2020
Steganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others. Therefore, the goal is to hide the existence of the secret data. Using steganography techniques, secret data can be concealed within an appropriate multimedia carrier, such as, image, audio, text files; among which digital image is the most widely used carrier format. Different steganography techniques are available, some are more advanced than the others, having strong and weak points respectively. The suitable technique can be selected as per the application requirement. The main objectives of steganography are undetectability, untraceable, robustness, and capacity of secret data. These are the factors that make it different from techniques such as cryptography. This paper analysis the uses of steganography and its techniques. It additionally aims to determine which steganography technique is more suitable for a certain application.
Journal of emerging technologies and innovative research, 2018
The quick advancement in the exchange of information through internet made it easier to exchange information exact and faster to the receiver. Security of data is one of the huge components of information technology and communication. Steganography is a term used for information hiding and it is an art of hidden writing. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. So, that observer cannot find the hidden information which we want to send to the receiver. Steganography main objective is to provide robustness, detectability, capacity of hidden data due to which it differs from other techniques such as watermarking and cryptography. This paper proposes a various technique used to hide information on image by an image steganography. In image steganography we hide our secret data in image so that the observer cannot feel its existence. Image steganography strategies are as of late been useful to send any secret message in the ...
Communications on Applied Electronics, 2016
Transmitting confidential images between two channels suffer from hacking. Therefore, protecting confidentiality has become a very essential issue. Recently, several methods are developed to protect important information. The main idea is based on embedding important information in multimedia carrier such as: text, image, audio, and video. The developed methods may be classified as steganography and watermarking. Steganography aims to embed huge amount of secret data in multimedia carrier while watermarking aims to hid small amount of secret data in multimedia carrier. This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.
akram dawood, 2019
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. Steganography-the art and science of hiding information into the other information so that the hidden information appears to be nothing to the human eyes has gained much attention. There are many ways to hide information inside an image, audio/video, document etc. But Image Steganography has its own advantages and is most popular among the others. This paper includes the important steganography methods and the main focus is on the review of steganography in digital images steganographic techniques in spatial domain such as least significant bit (LSB), pixel value differencing (PVD). The different aspects on which the steganography method depends are: robustness, capacity, undetectability. Keywords Steganography, Least significant bit (LSB), Pixel value differencing (PVD), Capacity, Stego-image, cover-image 1. Introduction Over the last two decades, the rapid development of internet requires confidential information that needs to be protected from the unauthorized users. This is accomplished through Data hiding. It is a method of hiding secret messages into a cover medium so that an unintended observer will not be aware of the existence of the hidden messages. This is achieved by steganography. The term steganography is retrieved from the Greek words stegos means cover and grafia meaning writing defining it as covered writing.[1]. Steganography is a technology that is used to hide secret information in digital media, thus hiding the fact that secret communication is taking place. By hiding secret information in less suspicious digital media, well-known channels, for example e-mail and social networking sites, are avoided, thereby reducing the risk of information being leaked in transit. Steganography is a technology concerned with ways of embedding a secret message in a cover message also known as a cover object in such a way that the existence of the embedded information is hidden. A secret message can be plaintext, ciphertext, an image, or anything that can be represented as a bit stream. The embedding process is sometimes parameterised by a secret key, called a stego key, and without knowledge of this key it is difficult for an unauthorised party to detect and extract the secret message. Once the cover object has information embedded in it, it is called a stego object. Steganography equation is 'Stego-medium = Cover medium + Secret message + Stego key. Theg eneral model
Steganography is defined as study of imperceptible conversation. Steganography typically deals with approaches of hiding presence of communicated information in sort of manner that it stays confidential. It preserves secrecy among two communicating groups. In image steganography, secrecy is attained by means of embedding records into cover image and producing a stego- image. There are distinct kind of steganography strategies each have their strengths and weaknesses. In this paper, we review distinct security and data hiding approaches that are utilized to implement a steganography for instance LSB, ISB, and MLSB etc.
2015
Steganography is the science of hiding the fact that communication is taking place, by hiding information behind information. Many different carrier file formats can be used, but digital media are the most popular because of their usage on the Internet. For hiding secret information in digital media, there exists a large variety of steganography techniques some are more complex than others and all of them have some advantages and disadvantage. Various applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret data, while others require a larger secret data to be hidden. This paper intends to give an overview of Digital media steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which stenographic techniques are more suitable for which applications.
Abstract— Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentially and data integrity are required to protect against unauthorized access and use. This has resulted in an unstable growth in the field of information hiding. In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, Digital signature, coding and so on have been used. Steganography is the best suited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips, text and sounds. This paper focuses on the various techniques in steganography to enhance the security of communication over an open channel.
Steganography is a art of communicating by hiding a type of information in other information.In the present era, the more attention is given to the art of displaying and sending hidden information because of security purpose.Therefore, different methods have been proposed so far for hiding information in different cover media. In this review paper, we are highlights the various study and research done before.Steganography's primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought.A lot of researchers has done tremendous work in this art but there is lack of a single means to concrete all the information in single study.This paper aims to fulfill that dearth.
2008
The goal of steganography is to insert a message into a carrier signal so that it cannot be detected by unintended recipients. Due to their widespread use and availability of bits that can be changed without perceptible damage of the original signal images, video, and audio are widespread carrier media. Steganalysis attempts to discover hidden signals in suspected carriers or at the least detect which media contain hidden signals. Therefore, an important consideration in steganography is how robust to detection is a particular technique. We review the existing steganography and steganalysis techniques and discuss their limitations and some possible research directions. Key words: Information hiding, steganography, steganalysis, watermarking 1
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2022
Cryptography, or the use of code, has a sinister relative called steganography. Steganography is supposed to offer confidentiality whereas encryption is said to provide privacy. A method of concealed communication is steganography. The process of steganography involves hiding a message in a suitable carrier, such as an image or audio file, which can then be transported to the receiver without anybody being aware that it contains a hidden message. This is a method that civil rights organizations in oppressive states, for instance, might utilize to propagate their message without the knowledge of their own government. This paper aims to discuss different techniques for implementing steganography to multimedia files (text, still images, audio, and video).
Zenodo (CERN European Organization for Nuclear Research), 2022
Nowadays, the volume of data shared over the Internet is growing. As a result, data security is referred to as a major issue while processing data communications through the Internet. During communication procedures, everyone requires their data to remain secure. Steganography is the science and art of embedding audio, message, video, or image into another audio, image, video, or message to conceal it. It is used to secure confidential information from harmful attacks. This research offers a classification of digital steganography based on cover object categories, as well as a classification of steganalysis art. Image visual quality, structural similarity, mean square error, Image Fidelity, embedding capacity, and robustness are some of the important aspects of steganography. Researchers have made tremendous advances in the realm of digital steganography. Nonetheless, it is vital to emphasize the advantages and disadvantages of modern steganography techniques. This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.
International journal of engineering research and technology, 2016
In this era of digitally driven world, it is imperative to secure digital information while communicating across the internet. Steganography is one of the techniques used for this purpose. This paper unfolds the need of steganography and the various forms of steganography. Also, it shed light on the general model of digital steganography with the terminology. The traditional method least significant bit substitution of steganography is discussed. Furthermore, a comparison is made between the traditional technique and one another techniques for quality of cover media and imperceptibility in terms of different performance metrics. Estimation about the size of secret message is made that can be embedded in the image.
2014
With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this paper we will be discussing one such data hiding technique called Steganography. Stegnography is the process of concealing sensitive information in any media to transfer it securely over the underlying unreliable and unsecured communication network. Our paper presents a survey on various data hiding techniques in steganography that are in practice today along with the comparative analysis of these techniques. Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of...
IJCRT(www.ijcrt.org), 2020
The innovation of technology and having fast internet make information to distribute over the planet easily and economically. this is often made people worry about privacy and works. Steganography may be a technique that forestalls unauthorized users to possess access to big data. The steganography provides methods that users can hide and blend their information with other information that make them difficult to acknowledge by attackers. In this, we review some techniques of steganography spatial and frequency domains. Also, we explain the kinds of steganography host documents. It also can pose serious problems due to it difficult to detect. Network surveillance and monitoring systems won't flag messages or files that contain steganographic data. and that we also see some applications, pros, and cons of steganography.
Proceedings of the Fifth Annual …, 2005
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
1998
Steganography and cryptography are cousins in the spycraft family. Cryptography scrambles a message so it cannot be understood. Steganography hides the message so it cannot be seen. A message in ciphertext, for instance, might arouse suspicion on the part of the recipient while an “invisible” message created with steganographic methods will not. In this article we discuss image files and how to hide information in them, and we discuss results obtained from evaluating available steganographic software.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
2012
Steganography, literally meaning “secret writing”, involves hiding a data file in another innocuous-looking file. From the time of Herodotus in Greece, to the defense mechanisms of today, steganography has been used to deny one’s adversaries the knowledge of message traffic. Steganography takes one piece of information and hides it within another. A “container file” holds the secret message in it, in such a way that the existence of the message cannot be suspected. This could be done in several possible ways, with newer methods being discovered with each passing day. In this paper, a detailed analysis of steganography is made. The history of steganography is briefly dealt with. How steganography works is examined, keeping in mind Bender’s specifications. Data hiding is implemented in three different media; text, audio and image files. Each offers challenges and solutions to these challenges are analysed. How they is implemented using steganographic tools is also seen. The main chara...
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Visual secret sharing (VSS) systems hide hidden images in shares that are also published on clarity or decrypted and saved in digital form. The shares can seem as noise-like pixels or as meaningful images, but this will raise suspicion and increase the risk of interception during transmission. As a result, VSS schemes face a transmission danger problem for both the secret and the individuals involved in the VSS system. To solve this issue, we presented a new palette-grounded steganography technique that uses a texture with LSB, as well as a natural-image-grounded VSS scheme (NVSS scheme) that shares secret images via colored carrier media to hide the secret and the actors during the transmission phase. To conceal secret messages, we convert the texture conflation process into steganography. Rather than using a being cover image to conceal dispatches, our algorithm conceals the source texture image and embeds hidden dispatches during the printing process. Prints or hand-painted filmland in digital or published form can be used for the natural shares. We also propose possible methods for concealing the secret in order to reduce the transmission threat problem for the share. The experimental results show that the proposed approach is an excellent solution to the transmission threat problem for VSS schemes.
ArXiv, 2019
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Different types of carrier file formats can be used, but digital images are the most popular ones because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points. Many applications may require absolute invisibility of the secret information. This paper intends to give an overview of image steganography, it’s uses and techniques, basically, to store the confidential information within images such as details of working strategy, secret missions, criminal and confidential information in various organizations that work for the national security such as army, police, FBI, secret service etc. The desktop application has been developed that incorporates Advanced Encryption Standard for encryption of the...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.