ArticlePDF Available

A Survey on various types of Steganography and Analysis of Hiding Techniques

Authors:

Figures

Content may be subject to copyright.
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014
ISSN: 2231-5381 http://www.ijettjournal.org Page 388
A Survey on various types of Steganography and
Analysis of Hiding Techniques
Navneet Kaur#1, Sunny Behal#2
1Research Scholar, Department of Computer science Engineering, SBSSTC, India
2Associate Professor, Department of Computer science Engineering, SBSSTC, India
Abstract—Digital Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier,
e.g., image, audio, and video files. Under this assumption, if the
feature is visible, the point of attack is evident, thus the here goal
is conceal to the existence of the embedded data .This is totally
review paper, in which we provide the comparison of available
steganography technology hiding text in an image file using Least
Significant Bit (LSB) based Steganography, Discrete Cosine
Transform (DCT) based Steganography and Discrete Wavelet
Transform (DWT) based steganography. The LSB algorithm is
implemented in spatial domain in which the payload bits are
embedded into the least significant bits of cover image to derive
the stego-image whereas DCT & DWT algorithm are
implemented in frequency domain in which the stego -image is
transformed from spatial domain to the frequency domain.
Keywords—Steganography, Cryptography, Least Significant Bit
(LSB); Discrete Cosine Transform (DCT); Discrete Wavelet
Transform (DWT).
I. INTRODUCTION
Steganography is the art and science of covered writing (hide
in plain sight) and its techniques are in use from hundreds of
years. Digital Steganography is the technique of securing
digitized data by hiding it into another piece of data. Today,
in digital age the easy access to any form of data such as audio,
videos, images and text make it vulnerable to many threats [1].
The data can be copied for purpose of copyright violation,
tampered with or illegally accessed without the knowledge of
owner. Therefore, the need of hiding secret identification
inside different types of digital data is required such that
owner can prove copyright ownership; identify attempts to
tamper with sensitive data and to embed annotations. The
main task of the field of steganography is the storing, hiding,
and embedding of secret data in all types of digital data. The
main goal of steganography is to communicate securely in a
completely undetectable manner [2] such that no one can
suspect that it exist some secret information. Unlike
cryptography, which secures data by transforming it into
another unreadable format, steganography makes data
invisible by hiding (or embedding) them in another piece of
data [3]. Thus cryptography is science of overt secret
writing while steganography as covert secret writing. The
cover, host or the carrier is the target media in which
information is hidden so that other person will not notice the
presence of the information. The modified cover, including
the hidden data, is referred to as a stego object which can be
stored or transmitted as a message [4]. The secret information
can be embedded in various types of covers. If
information is embedded in a cover text (text file), the
result is a stego-text object. Similarly, it is possible to
have cover audio, video and image for embedding
which result in stego-audio, stego-video and stego-
image respectively. Nowadays, the combinations of
steganography and cryptography methods are used to ensure
data confidentiality [5] and to improve information security.
Steganography is used in other grounds also like copy right,
preventing e-document forging. Table 1 shows the comparison
of various secret communication techniques used nowadays
TABLE I
COMPARISON OF SECRET COMMUNICATION TECHNIQUES
Secret
Communication
Techniques Confidentiality Integrity Un-
removability
Encryption
Yes
No
Yes
Digital
Signatures
No Yes/No
No
Ye
s/No
Yes/No
Yes
The proposed paper provide a systematic survey of existing
Steganography research by categorizing existing methods
according to the certain features and analysing the advantages
of these features. The motive of the paper is to provide
researchers with in-depth study of subject. The proposed
paper is organized in 4 sections. Section 2 deals with the
classification of various types of steganography. The section 3
demonstrates the comparative study of existing steganography
methods.
Fig1. Process of steganography
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014
ISSN: 2231-5381 http://www.ijettjournal.org Page 389
Figure 1 shows a simple representation of the generic
embedding and decoding process in steganography. In this
example, a secret image is being embedded inside a cover
image to produce the stego image. The first step in embedding
and hiding information is to pass both the secret message and
the cover message into the encoder. Inside the encoder, one or
several protocols will be implemented to embed the secret
information into the cover message. The type of protocol will
depend on what information you are trying to embed and what
you are embedding it in. For example, you will use an image
protocol to embed information inside images
II. CLASSIFICATIONS OF DIGITAL STEGANOGRAPHY
The steganography can be classified according to its
importance and goals. So; various types of steganography are:
Fig2. Types of steganography
1) Linguistic Steganography:
Linguistic technique is used to hide the message within the
cover text in non-obvious way such that the presence of
message is imperceptible to an outsider [6]. It is divided into
two types:
A) Semagrams: It uses only symbols and signs to hide the
information. It is further categorized into two ways:
i) Visual Semagrams: A visual semagrams uses physical
objects used every day to convey a message. For example: the
positioning of items on a particular website.
ii)Text Semagrams: This type is used to hides a message by
modify the appearance of the carrier text, or by changing font
size and type, or by adding extra space between words and by
using different flourished in letters or handwritten text.
B) Open Code: In this approach the message is embedded in
legitimate paraphrases of cover text in the way such that it
appears not obvious to an unsuspecting observer. It can be
achieved by two ways viz., Jargon which is understood only
by a group of peoples and Cipher which uses some concealed
ciphers to hide a message openly in the carrier medium. A
subset of jargon codes are cue codes, where certain pre-
arranged phrases convey meaning.
2) Technical Steganography:
Technical steganography uses special tools, devices or
scientific methods to hide a message. In this type one can use
invisible ink, microdots, computer based methods or various
hiding places to keep message secret
I) Cover: The cover message is the carrier of the message such
as image, video, audio, text, or some other digital media [7].
The cover is divided into blocks and message bits which are
hidden in each block. The information is encoded by changing
various properties of cover image. The cover blocks remain
unchanged if message block is zero [8].
A) Text Steganography: In this approach the cover text is
produced by generating random character sequences,
changing words within a text, using context-free grammers or
by changing the formatting of an existing text to conceal the
message. The cover text generated by this approach can
qualify for linguistic steganography if text is linguistically-
driven. Although these text- based methods has its own
unique characteristics for cover text but suffers from various
problems from both a linguistic and security stand point [9]
[10].
B) Image Steganography:
This Steganography technique is more popular in recent year
than other steganography possibly because of the flood of
electronic image information available with the advent of
digital cameras and high-speed internet distribution. It can
involve hiding information in the naturally occurred noise
within the image. Most kinds of information contain some
kind of noise. Noise refers to the imperfections inherent in the
process of rendering an analog picture as a digital image. In
Image steganography we can hide message in pixels of an
image. An image steganographic scheme is one kind of
steganographic systems, where the secret message is hidden in
a digital image with some hiding method [11]. Someone can
then use a proper decoding procedure to recover the hidden
message from the image. The original image is called a cover
image in steganography, and the message-embedded image is
called a stego image [12] [13]. Various methods of image
steganography are:
i) Data Hiding Method: hiding the data, a username and
password are required prior to use the system. Once the user
has been login into the system, the user can use the
information (data) together with the secret key to hide the data
inside the chosen image. This method is used to hiding the
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014
ISSN: 2231-5381 http://www.ijettjournal.org Page 390
existence of a message by hiding information into various
carriers. This prevents the detection of hidden information
[14].
ii) Data Embedding Method: For retrieving the data, a secret
key is required to retrieving back the data that have been
embedded inside the image. Without the secret key, the data
cannot be retrieved from the image. This is to ensure the
integrity and confidentiality of the data. The process of
embedding the message inside the image, a secret key is
needed for retrieving the message back from the image, the
secret message that is extracted from the system is transfer
into text file and then the text file is compressed into the zip
file and zip text file is converting it into the binary codes [15].
iii) Data Extracting Method: It is used to retrieve an original
message from the image; a secret key is needed for the
verification. And for extracting method, a secret key is needed
to check the key is correct with the decodes from the series of
binary code. If key is matched, the process continues by
forming the binary code to a zipped text file, the unzip the text
file and transfer the secret message from the text file to
retrieve the original secret message [15].
I) Features Of Image Steganography:
1) Transparency: The steganography should not affect the
quality of the original image after steganography.
2) Robustness: Steganography could be removed intentionally
or unintentionally by simple image processing operations like
contrast or enhancement brightest gamma correction,
steganography should be robust against variety of such attacks.
3) Data payload or capacity: This property describes how
much data should be embedded as a steganography to
successfully detect during extraction.
C) Audio Steganography:
Audio steganography, the hiding of messages in audio “noise”
(and in frequencies which humans can’t hear), is another area
of information hiding that relies on using an existing source as
a space in which to hide information. Audio steganography
can be problematic and can be useful for transmitting covert
information in an innocuous cover audio signal [8] [16]
A) Types of Audio Steganography:
1) Echo Hiding
2) Phase Coding
3) Parity Coding
4) Spread Spectrum
5) Tone insertion
1) Echo Hiding: This method embeds data or text into audio
signals by adding a small echo to the host signal. The Nature
of the echo is a resonance added to the host audio. Then the
data is invisible by varying three echo parameters: initial
amplitude, decay rate, and offset. If only one echo is produced
from the original signal, then only one bit of information
could be encoded [17]
2) Phase Coding: One of the most effective coding methods in
terms of the signal-to perceived noise ratio. In this phase
components of sound are not as perceptible to the human ear
as noise is. It can be done by substituting the phase of an
initial audio segment with a reference phase that represents
the data. It encodes the message bits as phase shifts in the
phase spectrum of a digital signal, achieving an inaudible
encoding in terms of signal-to-perceived noise ratio
subsequent segments is then adjusted store the relative phase
between segments. Disadvantage: It is a complex method and
has low data transmission rate [17] [18]
3) Parity Coding: This method breaks a signal down into
different regions of samples and encodes each bit from the
secret message in a sample region's parity bit. If the parity bit
of selected region does not match the secret bit to be encoded,
Disadvantage: This method like LSB coding is not robust in
nature. Advantage: The sender has more of a choice in
encoding the secret bit, and the signal can be changed in a
more unobtrusive manner [17]
4) Spread Spectrum: This is analogous to a system using an
implementation of the LSB coding that randomly spreads the
message bits over the entire sound file. It is used to encode a
category of information by spreading the encoded data across
frequency spectrum. This allows the signal reception, even if
there is interference on some frequencies. Disadvantage: It
can introduce noise into a sound file [17] [18].
5) Tone insertion: In this inaudibility of lower power tones in
the presence of significantly higher ones. Tone insertion
method can resist to attacks such as low-pass filtering and bit
truncation addition to low embedding capacity, embedded
data could be maliciously extracted since inserted [19]
A) Uses of Audio Steganography:
1) Audio data hiding can be used anytime you want to
hide data. There are many reasons to hide data but most
important is to prevent unauthorized persons from becoming
aware of the existence of a message.
2) Audio data hiding can also be used in the non
commercial sector to hide information that someone wants to
keep private.
3) It can also be used in forensic applications for inserting
hidden data into audio files for the authentication of spoken
words and other sounds
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014
ISSN: 2231-5381 http://www.ijettjournal.org Page 391
III) TECHNIQUES OF STEGANOGRAPHY:
1) Method: In spatial domain, images are represented by
pixels. Simple watermarks could be embedded by modifying
the pixel values or the least significant bit (LSB) values [20].
It directly loads the raw data into the image pixels. Some of its
algorithms are LSB, SSM Modulation based technique.
A)Spatial Domain: In this technique only the least significant
bits of the cover object is replaced without modifying the
complete cover object. It is a simplest method for data hiding
but it is very weak in resisting even simple attacks such as
compression, transforms [23].
i) Least Significant Bit (LSB):
This is the most common, simple approach for embedding
data in a cover image. The least significant bit (8th bit) of one
or all of the bytes inside an image is changed to a bit of the
secret message. When we use 24-bit image, three color bits
components are used which are red, green, blue, each byte
store 3 bits in every pixel. An 800 × 600 pixel image, can thus
store a total amount of 1,440,000 bits or 180,000 bytes of
embedded data. For example a grid for 3 pixels of a 24-bit
image can be as follows:
(00101101 00011100 11011100)
(10100110 11000100 00001100)
(11010010 10101101 01100011)
When the number 200, which binary representation is
11001000, is embedded into the least significant bits of this
part of the image, the resulting grid is as follows:
(00101101 00011101 11011100)
(10100110 11000101 00001100)
(11010010 10101100 01100011)
The number was embedded into the first 8 bytes of the grid,
only the 3 underlined bits needed to be changed according to
the embedded message. On average, only half of the bits in an
image will modified to hide a secret message using the
maximum cover size. Since there are 256 possible intensities
of each primary color, changing the LSB of a pixel results in
small changes in the intensity of the colors. These changes
cannot be visible by the human eye due to the message hidden.
In these consecutive bytes of the image data from the first
byte to the end of the message – are used to embed the
information. And easy to detect, more secure system for the
sender and receiver to share a secret key that specifies only
some pixels to be changed In its simplest form, LSB makes
use of BMP images, since they use lossless compression. It
hide a secret message inside a BMP file, one would require a
very large cover image. In BMP images of 800 × 600
Pixels are not often used on the Internet and might arouse
suspicion. For this reason, LSB steganography has also been
developed for use with other image file formats [4]. It is a
simple method for embedding data in a cover image. This is
the simplest algorithm in which information can be inserted
into every bit of image information. Given an image with
pixels, and each pixel being represented by an 8-bit sequence,
the watermarks are embedded in the last (least significant bit)
of selected pixels of the image proposed a simple data hiding
technique by simple LSB substitution. In this technique last
bit of host data is randomly changed and produce the
watermarked data at output. The cover LSB media data are
used to hide the message [21].
ii) Pixel Value Differencing:
It provides both high embed-ding capacity and outstanding
imperceptibility for the stego-image; this segments the cover
image into non overlapping [8] blocks containing two
connecting pixels and it modifies the pixel difference in each
pair for data embedding.
iii) Pixel Indicator:
This method gives the stego images of better quality than the
traditional method while maintaining a high embedding
capacity and it also uses concept of hiding the data using the
difference between the pixel values [20]. It’s more complex
way of hiding information in an image. Transformations are
used on the image to hide information in. Transform domain
embedding can be termed as a domain of embedding
techniques in frequency domain; image is represented in terms
of its frequencies.
B) Frequency Domain:
i) Discrete Cosine Transformation:
These methods convert the uncompressed image into JPEG
compressed type[22]It is based on data hiding used in the
JPEG compression algorithm to transform successive 8x8-
pixel blocks of the image from spatial domain to 64 DCT
coefficients each in frequency domain. [23]The main
advantage of this method is its ability to minimize the block
like appearance resulting when boundaries between the 8x8
sub-images become visible (known as blocking artefact).
ii) Discrete Wavelet Transformation:
It gives the best result of image transformation .it splits the
signal into set of basic functions .there are two types of
wavelet transformation one is continuous and other is discrete
[24] This is the new idea in the application of wavelets, in this
the information is stored in the wavelet coefficients of an
image, instead of changing bits of the actual pixels. It also
performs local analysis and multi-resolution analysis. DWT
transforms the object in wavelet domain and then processes
the coefficients and performs inverse wavelet transform to
show the original format of the stego object [25].
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014
ISSN: 2231-5381 http://www.ijettjournal.org Page 392
IV COMPARISON OF DIFFERENT STEGANOGRAPHIC
TECHNIQUES TABLE 2:
Steganogra
phy
Techniques
Cover
Media
Embedding
Techniques
Advantages
Image
Hiding
Image
1.LSB(Lea
st
Significant
Bit)
This method is used
the least significant
bit of every pixel in
one image to hide
the most significant
bit of another
Simplest & easiest
way of hiding
information
2.DCT
(Discrete
Cosine
Transform)
Embeds the
information by
altering the
transformed DCT
co-efficient
Hide data can be
distributed more
evenly over the
whole image in
such a way to
make it robust
3.DWT
(Discrete
Wavelet
transform)
This technique work
by talking many
wavelet to encode a
whole image
Coefficient of
wavelet are altered
with the noise
within tolerable
level
III. CONCLUSION
In this paper provides literature review on digital
steganography. As steganography becomes widely used in
computing, there are issues that need to be resolved. There are
a wide variety of different techniques with their own
advantages and disadvantages. We surveyed various types of
steganography. We studied the various techniques, Least
Significant Bit (LSB), DCT (Direct Cosine Transform), DWT
(Discrete Wavelet Transform)which helps to improve in
security.
REFERENCES
[1] Artz, Donovan. "Digital steganography: hiding data within data."
internet computing, IEEE 5.3 (2001): 75-80.
[2] Amin, Muhalim Mohamed, et al. "Information hiding using
steganography." Telecommunication Technology, 2003. NCTT 2003
Proceedings. 4th National Conference on. IEEE, 2003.
[3] Shashikala Channalli, Ajay Jadhav, Steganography An Art of
Hiding Data” International Journal on Computer Science and
Engineering Vol.1(3), 2009, 137-141
[4] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview of
image steganography." ISSA. 2005.
[5] Yuk Ying Chung, fang Fei Xu , “Development of video watermarking
for MPEG2 video” City university of Hong Kong ,IEEE 2006.
[6] Singh, Nanhay, Bhoopesh Singh Bhati, and R. S. Raw. "Digital image
Steganalysis for computer forensic investigation." Computer Science
and Information Technology (CSIT) (2012): 161-168..
[7] AL-Shatnawi, Atallah M., and Bader M. AlFawwaz. "An Integrated
Image Steganography System with Improved Image Quality." Applied
Mathematical Sciences 7.71 (2013): 3545-3553.
[8] Bhattacharyya, Souvik and Gautam Sanyal. "A Robust Image
Steganography using DWT Difference Modulation (DWTDM)."
International Journal of Computer network & Information Security
4.7 (2012)..
[9] K. Bennett, “Linguistic Steganography: survey, analysis, and robustness
concerns for hiding information in text” center for Education and
Research in Information Assurance and Security,Purdue University
2004.
[10] Hitesh Singh, Pradeep Kumar Singh, Kriti saroha “A Survey on Text
Based Steganography” Proceedings of the 3rd National Conference;
INDIACom-2009 Computing For Nation Development, February 26 –
27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and
Management, Ne w Delhi.
[11] Hitesh Singh, Pradeep Kumar Singh, Kriti Saroha “A Survey on Text
Based Steganography” Proceedings of the 3rd National Conference;
INDIACom-2009 Computing For Nation Development, February 26 –
27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and
Management, Ne w Delhi
[12] Jain, Nitin, Sachin Mesh ram, and Shikha Dubey. "Image
Steganography Using LSB and Edge–Detection Technique. "
International Journal of Soft Computing and Engineering (IJSCE)
ISSN (2012): 2231-2307.
[13] M. M. Amin, M. Salleh, S. Ibrahim, M.R. Katmin, M.Z.I. Shamsuddin,
“Information Hiding using Steganography” Proceedings of 4th National
Conference on Telecommunication Technology, Shah Alam , Malaysia,
2003.
[14] Amin, Mohamed “Muhalim and Ibrahim, Subariah and Salleh,
Mazleena and Katmin, Mohd rozi (2003) Information hiding using
steganography.
[15] Ibrahim, Rosziati, and Teoh suk Kuan. "Steganography Algorithm to
hide secret message inside an Image." arXiv preprint arXiv: 1112.2809
(2011).
[16] Jenkins, Neil, and Jean Everson Martina "Steganography in audio."
University of Cambridge CST Part II Dissertation (2009) ..
[17] Nosrati, Masoud, Ronak Karimi, and Mehdi Hariri. "Audio
Steganography: A Survey on Recent Approaches." World Applied
Programming 2.3 (2012): 202-205..
[18] Dutta, Poulami, Debnath Bhattacharyya, and Tai-hoon Kim. "Data
hiding in audio signal: A review." International journal of database
theory and application2.2 (2009): 1-8..
[19] H.B.kekre , Archana Athawale , “Information Hiding In Audio
Signal”.Intertional Journal of Computer Application volume 7-No.9
October 2010.
[20] Sohag, Saeed Ahmed, Md Kabirul Islam, and Md Baharul Islam. "A
Novel Approach for Image Steganography Using Dynamic
Substitution and Secret key. "
[21] Goel, Arun Rana, and Stuti Manpreet Kaur. "A Review of Comparison
Techniques of Image Steganography. " Global Journal of Computer
Science and Technology 13.4 (2013) .
[22] AL- Shatnawi, Atallah M., and Bader M. AlFawwaz. “An Integrated
Image Steganography System with Improved Image Quality." Applied
Mathematical Sciences 7.71 (2013): 3545-3553..
[23] Bhattacharyya, Souvik, and Gautam Sanyal. "A Robust Image
Steganography using DWT Difference Modulation
(DWTDM)." International Journal of Computer Network &
Information Security 4.7 (2012) .
[24] Saddaf rubab and M Younus article: Improved Image Steganography
Technique for Colored Images using Wavelet Transform. International
Journal of Computer Applications 39(14):29-32, February 2012.
Published by Foundation of Computer Science, New York, USA.
[25] Banik Bamali Gupta and Samir K Bandvopadhvay ” A DWT Method
for Image Steganography “International Journal 3.6(2013)
... The first, open code, employs appropriate cover text paraphrases to conceal the message from the untrained eye. The second, closed code, uses a combination of the two [11]. The second type of steganography is the technical kind, which makes use of scientific methods and tools to obfuscate a message, such as mathematicalsequence LSB embedding. ...
... This strategy is preferred to the linguistic one because of its increased safety. The information can be in one of four formats: text, images, moving pictures, or sound [11] [12]. ...
... In LSB embedding steganography, the message bits are merely inserted into the LSB plane of the cover image in a predetermined order. Since the amplitude of the change is negligible, modulating the LSB has no perceptible effect on humans [11] [12]. ...
... The message is transmitted in frequencies that are not heard by humans. Echo hiding and tone insertion are from audio steganography ways [3]. ...
... First of all, LSB embedding where we take a normal RGB image and insert the secret message in some of the bits of the colours. For instance, every colour contains 8 bits so we have 24 bits, the LSB is normally the eighth one of every colour, we insert the message in this bit in all pixels and as the dimensions increase , the number of bits increase [3].In LSB, the only acceptable form of information is binary so the message is inverted to binary to be transmitted through the cover image. It is advised that the used number of significant bits is not more than 3 bits from every byte or else the image resolution will get very low therefore it will be suspect that this image carries information [5]. ...
... Last but not least ,Pixel Indicator ,this technique uses the idea of hiding information by difference in the pixel values whilst maintaining huge embedding capacity and high quality of cover images. This technique is a bit complex and some transformations are used on the image to hide information and the transformed image is represented in the frequencies it contain[3]. Each pixel in an image has bits to describe the colour and the least number of bits that can be used is 8 that is called the bit depth. ...
... Rearranging characters inside a document, modifying the layout of a given document to hide the information, employing context-free grammar, or producing unpredictable letter patterns, are all ways to create the cover message used in text steganography. These approaches have a number of issues from a language and safety perspective, however, their distinctive qualities for cover text cannot be ignored [11]. [9] also added that text steganography involves concealing data within text documents. ...
... Some other technique for concealing data that depends on utilizing an available source as a place to conceal data, is audio steganography, which involves concealing information in sound and in ranges that are inaudible. However troublesome it may be, audio steganography is a helpful tool for hiding data in plain sight [11]. The effectiveness of the techniques of audio steganography is influenced by a number of factors. ...
Thesis
Full-text available
There are hundreds of papers which discuss and propose steganography schemes using the LSB approach. Some of these papers are reviewed and documented in this article. Moreover, this paper presents a novel steganography scheme designed to enhance the security and efficiency of transmitting vital or confidential information over the internet through image concealment. The proposed scheme utilizes LSB embedding, an Arithmetic sequence, and the Rudin-Shapiro sequence to embed secret data within cover images. The objective of this research is to develop a software solution that ensures the secure transmission of information while outperforming existing techniques. The system was implemented using Wolfram Mathematica on various cover images, and different message lengths were considered. Performance evaluation metrics including MSE, PSNR, SSIM, NCC, and IF were employed to assess the system's effectiveness. The results demonstrate that the proposed scheme achieves minimal distortion and maintains acceptable image quality across different message lengths. Comparative analyses with other steganography techniques indicate the superiority of the proposed scheme in terms of numerical metrics, although certain schemes excel in specific scenarios. This research contributes to advancing the field of steganography and highlights opportunities for further enhancements and comparisons against more advanced techniques.
... Деякі з досліджень, опублікованих в області аудіостеганографії, розглядають набір таких загальних підходів, як Least Significant Bit (LSB), Echo Hiding, Spread Spectrum (SS), Phase Coding, розглянутих у [4]. ...
Article
Audio file steganography can be used as an effective and efficient method to hide messages, but it is a complex process because the human auditory system is sensitive to small changes in audio data. In this article an improved approach for hiding secret text message in audio is presented, combining steganography and cryptography. The Least Significant Bits (LSB) technique, one of the most common and basic methods of steganography, is used as an algorithm for steganographic transformation. The described point of this method is to replace the least significant bits of the audio container with message bits that contain not very useful information, so filling them with additional information has little effect on the quality of perception. Such a significant disadvantage as the low level of reliability is improved by the introduction of a cryptographic layer, the feasibility of which is justified in the article. Cryptographic protection has been added in the form of one of the modern symmetric encryption algorithms – the AES algorithm in the CBC mode. Pseudo-random numbers are used to create a stable cryptokey. The cryptoalgorithm is used to protect the message, which after cryptographic conversion is hidden in the audio file using the steganographic LSB method. The main characteristics of the stegosystem are analyzed. In this paper, the application system of steganographic protection of information in audio files using a cryptographic algorithm is implemented using the environment of Microsoft Visual Studio 2019 and cryptographic libraries, the programming language is C ++. A WAV audio file was used as the digital container. NIST tests were used to assess resistance to stegoanalysis, which according to the results is better using an improved method compared to the classical LSB approach. In addition, the steganographic algorithm is evaluated by visual analysis by comparing the original audio file and the stegofile with the hidden message. The results of the analysis indicate the absence of traces of steganography. Based on the obtained results, it can be argued about the reliability and efficiency of the proposed approach, so the use of LSB-AES technique can be proposed to ensure secure data transmission.
... Reconsideration techniques that involve modifying the least significant bits of characters in the text to embed information. LSB embedding is a common and relatively simple method used in text steganography [15,21]. ...
Chapter
Full-text available
Steganography is a technique that hides confidential information (which we call cover) in some other data without leaving any clear proof of data manipulation. All traditional steganographic techniques have limited ability to hide information. They can hide only 10% (or less) of the cover data. Although most recent research has focused on hiding data in images, many image solutions are more complex when applied as a cover to natural language text. Different applications are used by different requirements of well-known text steganography algorithms. We require both ultimate hidden and a huge amount of confidential data to be concealed which is defined by a shared petition. There are many approaches in steganography that try to detect statistical discrepancies in coverage in which availability of hidden information is predicted. Writings covering natural language must not only automatically collect analytical data, but also transmit it to the human reader’s minds.
... Steganography is the art and science of hiding data such that it existence is concealed from unauthorized users [6]. The science of steganography involves hiding message such as video, audio, text and image file within another such that it appear innocent and not draw attention of intruders [17]. Steganography can be classified into image, video, text and audio steganography [27]. ...
Article
Full-text available
cloud computing is a collection of configurable shareable resources accessible via the internet. Cloud computing save individuals and organizations the cost of buying and maintaining resources such as memory storage, software, network, server, operating system by using the one available on cloud by paying according the resources used. The major drawback of cloud computing is security challenges. This is because cloud resources are managed by third party. Some security techniques such as cryptography and steganography are used to protect data to be stored on the cloud from intruders. This work proposed an enhanced security system using RSA as digital signature and image steganography to improve the security of data stored on the cloud in order to prevent the access of those data when uploading or downloading them from the cloud from unauthorized users and also evaluate the efficiency of the system by measuring the computing resources such as memory storage, CPU processing, power and network bandwidth consumed by the algorithms using different data types and size.
... It is an encryption and file manager program for the Windows platform. The disadvantage is that it uses a 3-bit segment algorithm which is vulnerable to Robustness [14], this means that any image processing operation (contrast, brightness, etc.) performed on the stego image can destroy the secret information [15]. ...
Article
Full-text available
Healthcare diagnosis records are essential as they establish perpetual reports on the health of patients. These records are in nature meant to be kept confidential. It is for this reason that medical data should be secured before transmission. Steganography and cryptography are old concepts used to secure communications. Steganography is hiding data into a carrier, for instance, images, videos, texts, and files. It seeks to hide the existence of communications. Cryptography is communication in deciphering secret writings or ciphers. In our privacy-preserving scheme for healthcare records, a hybrid approach is used to ensure the maximum multi-level security of medical records before transmission. The proposed system utilizes AES-128 which is a symmetric key encryption algorithm to scramble the data. As compared to asymmetric key encryption, symmetric key encryption is faster as only one key is used for both encryption and decryption. To resolve the problem of key distribution that plagues symmetric cryptosystems, the proposed system makes use of the Diffie-Hellman key exchange algorithm for key agreement. In this way, the encryption essentials are securely exchanged before the actual transmission of the date. To ensure efficient and optimal steganography throughput, the Least significant bit (LSB) which involves the hiding of information in the most repetitive bits of each pixel of an image was implemented for steganography. The technique was chosen because the level of distortion made to the image is low hence the image quality change is minimal. As such, the resultant robust system, is highly impeccable, utilises efficient compression, and has improved capacity which are all desirable features for securing medical health records.
Chapter
Data privacy has been a significant concern since the beginning of the Internet, and in the current scenario, the need and importance of data privacy are increasing exponentially. Today, a multitude of media formats including text, images, videos, Graphics Interchange Format (GIFs), etc., are available for exchanging data, and techniques of cryptography and steganography play a key role in maintaining data secrecy during such transmissions. This paper elaborates on the GIF-based techniques of steganography. It provides a detailed comparison of the working, advantages and limitations of the major approaches developed in this field in the last three decades. It provides a clear and chronological understanding regarding the evolution of GIF-based steganography methods and discusses future directions to enhance the existing techniques.KeywordsGIFSteganographyColour palettePixels
Chapter
Full-text available
Machine translation (MT) aims to remove linguistic barriers and enables communication by allowing languages to be automatically translated. The availability of a substantial parallel corpus determines the quality of translations produced by corpus-based MT systems. This paper aims to develop a corpus-based bidirectional statistical machine translation (SMT) system for Punjabi-English, Punjabi-Hindi, and Hindi-English language pairs. To create a parallel corpus for English, Hindi, and Punjabi, the IIT Bombay Hindi-English parallel corpus is used. This paper discusses preprocessing steps to create the Hindi, Punjabi, and English corpus. This corpus is used to develop MT models. The accuracy of the MT system is carried out using an automated tool: Bilingual Evaluation Understudy (BLEU). The BLEU score claimed is 17.79 and 19.78 for Punjabi to English bidirectional MT system, 33.86 and 34.46.46 for Punjabi to Hindi bidirectional MT system, 23.68 and 23.78 for Hindi to English bidirectional MT system.KeywordsMachine translationSMTCorpus-basedParallel corpusBLEU
Chapter
The article presents an applied steganographic system of hiding textual information in audio files on the basic of an advanced approach that combines the methods of steganography and cryptography. The method of the least significant bit (LSB) was used as a steganographic transformation algorithm. The low level of reliability of the method can be improved by introducing a cryptographic layer, the feasibility of which is justified in the article. The improvement is to add one of the modern symmetric encryption algorithms – the AES algorithm in CBC mode. The applied steganographic system for hiding textual information in audio files, taking into account the improvement of the LSB method, is implemented in the Microsoft Visual Studio 2019 environment using the cryptographic libraries that are present in it. The application is developed in the C++ programming language. NIST tests were used to assess the stability of the implemented system to steganalysis. The proposed approach is considered in order to anticipate its role in emerging networks.KeywordsSteganographySteganographic systemLeast significant bitAES-CBCAn audio fileNIST-tests
Article
Full-text available
In this study, we will have a survey on audio steganography recent researches. Due to it, some basic concepts of audio steganography and HAS including Least Significant Bit (LSB) Coding, Parity Coding, Phase Coding, Spread Spectrum (SS) and Echo data hiding are covered. In follow, a brief introduction and abstract of 7 recent methods for audio steganography is presented.
Article
Full-text available
2013 w w w . a j e r . o r g Page 118 Abstract: -Steganography is a system that hides information in an application cover carrier like image, text, audio, and video. Considerable amount of work has been carried out by different researchers on this subject. Least Significant Bit (LSB) insertion method was more suspicious and low robustness against attacks. The objectives of this study were to analyse various existing system and implement a dynamic substitution based Image Steganography (IS) with a secret key. Our proposed method is more difficult to attack because of message bits are not inserted in to the fixed position. In our method, the message bits are embedded into deeper layer depending on the environment of the host image and a secret key resulting increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message.
Conference Paper
Full-text available
This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this paper, we introduce Steganalysis for computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime and computer crime. With the help of Steganalysis, it detect the hide message which is transfer in the network. Furthermore, we have described the security system classification.
Article
Full-text available
In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, coding and so on have been used. Steganography is the best-suited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips and sounds. However, text steganography is not normally preferred due to the difficulty in finding redundant bits in text document. To embed information inside a document its characteristics should be altered. These characteristics can be either the text format or characteristics of the character. But the problem is that if slight change has been done to the document then it will become visible to the third party or attacker. The key to this problem is that to alter the document in such a way that it is simply not visible to the human eye yet it is possible to decode it with computer. For this purpose various methods of text-based steganography have been purposed like line shifting, word shifting, feature coding, white space manipulation etc. In this paper, we present an overview of the steganography, with a particular focus on text-based steganography in details.
Article
Full-text available
Steganography is the most used technique for data hiding. We can implement it using any cover media like text, images, and videos. In this paper we devised a new algorithm to hide our text in any colored image of any size using wavelet transform. It improves the image quality and imperceptibility. Our method sustains the security attacks. Extensive testing is performed using different sizes of images and presented our results in payload and PSNR values.
Conference Paper
Authors frequently use different names to refer to the same gene or protein names across Bio-medical articles. Identifying the alternate names for the same gene/protein would help biologists in the process of gene-protein interactions and protein-protein interactions. Biomedical databases such as SWISSPROT, GenBank, GOLD, UniGene and Karyn's Genome include synonyms, but these databases may not be always up-to-date. Therefore, it is necessary to automate this process, because of the increasing number of discovered genes and proteins. In this paper we considered this problem as Natural Language processing (NLP) problem and solved using SSFPOA semantic measure. Experiments were conducted on Medline abstracts and results are compared with existing methods. Machine learning algorithms are used in our work to analyze the performance of our method. Results are evaluated with the help of performance measures and results showed high percentage of accuracy when compared with existing works.
Article
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography. The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego -image is transformed from spatial domain to the frequency domain and the payload bits are embedded into the frequency components of the cover image. The performance and comparison of these three techniques is evaluated on the basis of the parameters MSE, PSNR, Capacity & Robustness.