PresentationPDF Available

Steganography as an art of Data Encryption

Authors:
  • Al-Qalam University Katsina

Abstract

As sending information became prominent in our contemporary life, many methods were developed and put into practice in order to secure the information that's being sent back and forth through communication medium. But the most trending technique nowadays is steganography, though the method is old dated back to 440 B.C, still now it's in research. This research gives an introduction to the field of steganography as a method of data encryption/hiding.
Steganography as an art of
Data Encryption
MSC. Seminar Report
By
Abdulhamid Usman Nuruddeen
MSC/17/CSC/0290
Department of Mathematics and Computer Science, Umaru Musa
Yar’adua University katsina.
25th May, 2019
Abstract
As sending information became prominent in our contemporary life, many methods were
developed and put into practice in order to secure the information that’s being sent back and
forth through communication medium. But the most trending technique nowadays is
steganography, though the method is old dated back to 440 B.C, still now it’s in research. This
research gives an introduction to the field of steganography as a method of data
encryption/hiding.
Certification
I certify that this research entitled Steganography as an art of Data Encryption by Abdulhamid
Usman Nuruddeen (MSC/17/CSC/0290) were carried under my supervision.
Dr. Abubakar Aminu Mu’azu ________________________
Supervisor Sign/Data
Acknowledgment
I am greatly indebted to my guide Dr. Abubakar Aminu Mu’azu for his invaluable guidance
during the course of the seminar. He always gave useful suggestions and also helped me when
the work was not moving ahead at times.
Abdulhamid Usman Nuruddeen
MSC/17/CSC/0290

Steganography as an art of Data Encryption
 


 
 !"#
2.1 Capacity #
2.2 Robustness#
2.3 Imperceptibility.#
2.4 Security #
 !"#
3.1 Cover-image. #
3.2 Message#
3.3 Stego-image #
3.4 Stego-key #
 "!!"#
4.1 Text $
4.2 Image $
4.3 Audio $
4.4 Video $
4.5 Protocol/Network$
% !"&$
5.1 Spatial Domain Technique'
5.1.1 Least-significant bit (LSB) '
5.1.2 Pixel-value differencing (PVD)'
5.1.3 LSB and PVD '
5.2 Transform Domain Technique. '
5.2.1 Discrete Fourier transformation (DFT)'
5.2.2 Discrete cosine transformation (DCT)(
5.2.3 Discrete wavelet transformation (DWT)(
  (
) (
%
1 Introduction
As using internet for sending information is growing (Hattab & Mehdi, 2018), there is need to
secure that information, many methods were adopted such as watermarking and steganography,
watermarking is for copyright protection and digital signatures while steganography is digital
objects (Setyono & Ignatius Moses Setiadi, 2019). The term steganography is derived from the
Greek words “steganos” (covered or secret) and “graphia” (writing or drawing) through hiding a
secret information in human body by means of writing or drawings (Siper, Farley, & Lombardo,
2005). Steganography is one of the types of cryptography, in which the existence of an
information is being hide, using tools such as microscopic writing, invisible ink, or hiding code
words within sentences of a message [25] in a way that attention will not be drawn (Kang, Liu,
Yang, Luo, & Zhang, 2019; Liu & Lee, 2019; Meng, Zhou, Cui, Sun, & Yuan, 2019; Setyono &
Ignatius Moses Setiadi, 2019) So that only the intended person that is aware of what happen can
be able to understand or encrypt the hidden information (Gahan & Devanagavi, 2019).
Steganography is the latest method that is continually in in practice to transfer information
securely to the receiver (Prabhune & Joshi, 2016), these information can be of type text, image,
audio, video and protocol (Agarwal, 2019; Hahn, 2019) and the steganography techniques for
hiding information include least-significant bit (LSB), pixel-value differencing (PVD) and LSB
and PVD (Liu & Lee, 2019) in order to detect and decrypt the hidden message a key maybe
required which is additional encrypted message, such as password, for decryption. For example,
when a secret information is encrypted within an image or any other digital objects, the result is
an encrypted-digital object. A possible formula of the procedure may be represented as: cover
medium + encrypted information + decryption key = actual-medium (Kadhim Farhan, Subhi Ali,
& Mazin Ali, 2019; Rana, 2016), this indicates that for any encrypted message or information
there is need for a decryption key, to recover the actual information. Steganalysis refers to the
group of techniques that can differentiate between clean images and stego images (images that
have been used as a carrier media of an embedded message), (Ibrahim & Rasool, 2017). In a
clear sense steganalysis is the art of uncovering steganographic information.
2 Things to Consider in Steganography
As outlined by (Nwanebu, 2008; Sabnis & Awale, 2016) there are certain things to consider
about steganography which include
2.1 Capacity: Number bits required to alter in order to hide the information.
2.2 Robustness: Unaltered information after steganalysis are what make steganography useful.
2.3 Imperceptibility: Ability to make information unnoticed.
2.4 Security: Ability to make information difficult or impossible to interpret by third party.
3 Terminologies used in Steganography
While terminologies as mentioned by [11], [16], [17] are:
#
3.1 Cover-image: the image to use in hiding information.
3.2 Message: the information to be hidden.
3.3 Stego-image: the actual message that is hidden in another image.
3.4 Stego-key: the key to use in steganalysis.
4 Types of steganography
Steganography has been further divided into five types as follows (Agarwal, 2019):
$
4.1 Text: where plain text consisting alphabets, alphanumeric or numbers kin which three
different coding techniques were used, such as line-move coding, word-shift coding and
feature coding (DIng et al., 2017).
4.2 Image: the most widely used form of steganography is using image to hide information,
some of the most common methods include; least significant bit (either 2 or three bit)
(LSB), masking and filtering can be used to hide information inside images, as one of the
most popular and easiest method of hiding information (Din, Mahmuddin, & Qasim,
2019).
4.3 Audio: by altering the audio in a way that it is difficult to detect the changes by just
listening, three methods were used in concealing information in audio, which include
reverberate concealing, LSB and stage coding.
4.4 Video: by introducing the information to be hide in the video, so that it cannot be detected
by mere eye looking or listening, two ways of hiding information in video include tri-way
pixel value differencing and motion vectors.
4.5 Protocol/Network: by using control protocols to hide data in network datagrams, such as
HTTP, FTP, TCP, UDP etc. (Al-manaseer, 2019)
5 Steganography techniques
Techniques of steganography as mentioned by (Agarwal, 2019; Al-manaseer, 2019) can be
classified into two categories; namely :- a. Spatial domain and b. Transform domain.
'
5.1 Spatial Domain Technique: Changes occur in special domain technique by altering some
bits of the image pixel. Some of the techniques used in spatial domain are, LSB, PVD
(Bhattacherjee, 2019; Hattab & Mehdi, 2018), Combine LSB and PVD etc.
5.1.1 Least-significant bit (LSB): Also called substitution-based spatial domain
technique (Nwanebu, 2008), were image is converted into bits, separate the most
significant bit from the LSB and substitute the LSB with the secret information.
5.1.2 Pixel-value differencing (PVD): It provides both high embed-ding
capacity and outstanding imperceptibility for the stego-image; this segments the
cover image into non overlapping blocks containing two connecting pixels and it
modifies the pixel difference in each pair for data embedding (Kaur & Behal,
2014).
5.1.3 LSB and PVD: This technique combines the two LSB and PVD, in order
to give more secured technique.
5.2 Transform Domain Technique: also known as frequency domain (Kaur & Behal, 2014),
this is more than just changing some bits, it requires intensive calculations and changes
which make it tedious compared to spatial domain technique. Technique in performing
transformation domain include: Discrete Fourier transformation technique (DFT), Discrete
cosine transformation technique (DCT), Discrete Wavelet transformation technique (DWT)
etc.
5.2.1 Discrete Fourier transformation (DFT): The features for steganalysis are
extracted from the DFT of the histogram of differential images and divided into
low and high frequency bands.
(
5.2.2 Discrete cosine transformation (DCT): it is the transformation of spatial
domain into the frequency domain, its commonly JPEG compression (Kour,
Talwar, & Vaid, 2016).
5.2.3 Discrete wavelet transformation (DWT): DWT hierarchically decays an
image into small waves known as wavelets. This is advantageous over DCT
because of its ability to capture frequency and location information. The algorithm
breaks down the image into multi-resolution sub-bands known as lower
approximation (LL), horizontal (HL), vertical (LH) and diagonal components
(HH). The HH components is a high frequency sub-band, which is the perfect
location to embed a secret message (Nwanebu, 2008).
6 Conclusion
Conclusively, we have seen things to consider in steganography as a means of data encryption as
well as terminologies used in steganography, also many methods of steganography were
presented as well as the techniques and a brief explanation of each.
References
Agarwal, A. (2019). Improved Approaches on DCT compression basedImage Steganography, 1–
8.
Al-manaseer, R. M. (2019). Steganalysis of Color Images for Low Payload Detection *+,-./
01234 5*-657 829:; *+4<=> 8?@6 *AB=.
Bhattacherjee, P. (2019). A review of Steganography techniques suitable for ECG signal,
(March).
Chapter 2 steganography and steganalysis methods 2.1 introduction. (n.d.), 15–54.
Din, R., Mahmuddin, M., & Qasim, A. J. (2019). Review on Steganography Methods in Multi-
Media Domain, 8, 288–292.
DIng, Z., Lei, X., Karagiannidis, G. K., Schober, R., Yuan, J., & Bhargava, V. K. (2017). A
Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and

Future Trends. IEEE Journal on Selected Areas in Communications, 35(10), 2181–2195.
https://doi.org/10.1109/JSAC.2017.2725519
Gahan, A. V, & Devanagavi, G. D. (2019). A Empirical Study of Security Issues In Encryption
Techniques, 14(5), 1049–1061.
Hahn, J. (2019). HIDING IN PLAIN SIGHT : HANDWRITING AND APPLICATIONS TO
STEGANOGRAPHY by James Hahn B . Phil . Computer Science , University of Pittsburgh
, 2019 Submitted to the Faculty of the Department of Computer Science in partial
fulfillment of the requirements for.
Hattab, A. A., & Mehdi, S. A. (2018). A novel steganography method based on 4 dominations
standard chaotic map in spatial domain. Journal of Theoretical and Applied Information
Technology, 96(16), 5280–5290.
Ibrahim, Z., & Rasool, R. (2017). The Detection of Data Hiding in RGB Images Using Statistical
Steganalysis CDEF-GDH I12J8 KLD7 5MA.D7 5MNODPQ RGB R@S 54TJD=DU 54+-.JV 6Q 9<;.
Kadhim Farhan, A., Subhi Ali, R., & Mazin Ali, S. (2019). Secure Location Map and Encryption
Key Based on Intelligence Search Algorithm in Encryption and Steganography to Data
Protection. International Journal of Mechanical Engineering and Technology, 10(1), 8–24.
Retrieved from
http://www.iaeme.com/IJMET/index.asp8http://www.iaeme.com/ijmet/issues.asp?
JType=IJMET&VType=10&IType=1http://www.iaeme.com/IJMET/issues.asp?
JType=IJMET&VType=10&IType=1
Kang, Y., Liu, F., Yang, C., Luo, X., & Zhang, T. (2019). Color Image Steganalysis Based on
Residuals of Channel Differences. Computers, Materials & Continua, 59(1), 315–329.
https://doi.org/10.32604/cmc.2019.05242
Kaur, N., & Behal, S. (2014). A Survey on various types of Steganography and Analysis of
Hiding Techniques. International Journal of Engineering Trends and Technology, 11(8),
388–392. https://doi.org/10.14445/22315381/ijett-v11p276
Kour, H., Talwar, L., & Vaid, A. (2016). Analysis of Different Steganography Algorithms and
Security Issues, 1(1), 11–16.
Liu, H. H., & Lee, C. M. (2019). High-capacity reversible image steganography based on pixel
value ordering. Eurasip Journal on Image and Video Processing, 2019(1).
https://doi.org/10.1186/s13640-019-0458-z
Meng, R., Zhou, Z., Cui, Q., Sun, X., & Yuan, C. (2019). A Novel Steganography Scheme
Combining Coverless Information Hiding and Steganography. Journal of Information
Hiding and Privacy Protection, 1(1), 43–48. https://doi.org/10.32604/jihpp.2019.05797
Nwanebu, D. (2008). Enhancing the Security of a Gateway through Steganography.
Prabhune, A. A., & Joshi, S. M. (2016). International Journal of Advanced Research in
Information Hiding Techniques for Data Security Using FPGA, 6(1), 226–230.
Rana, M. (2016). Parameter Evaluation and Comparison of algorithms used in Steganography,
6(7), 8134–8143. https://doi.org/10.4010/2016.1901
Sabnis, S. K., & Awale, R. N. (2016). Statistical Steganalysis of High Capacity Image
Steganography with Cryptography. Procedia Computer Science, 79, 321–327.
https://doi.org/10.1016/j.procs.2016.03.042
Setyono, A., & Ignatius Moses Setiadi, D. R. (2019). Securing and Hiding Secret Message in
Image using XOR Transposition Encryption and LSB Method. Journal of Physics:
Conference Series, 1196, 012039. https://doi.org/10.1088/1742-6596/1196/1/012039
Siper, A., Farley, R., & Lombardo, C. (2005). The rise of steganography. Proceedings of

Student/Faculty Research Day, 1–7. Retrieved from
http://csis.pace.edu/~ctappert/srd2005/d1.pdf
Tiwary, A. (2019). DIFFERENT IMAGE STEGANOGRAPHY TECHNIQUES : AN
OVERVIEW International Journal of Computer Engineering and Applications ,
DIFFERENT IMAGE STEGANOGRAPHY TECHNIQUES : AN OVERVIEW, (March),
0–13.
TUZA, W., & KASAPOĞLU, Ö. Ü. N. G. K. (2018). Least Significant Bit Gaped: A New
Method for Image Steganography. International Journal of Electronics, Mechanical and
Mechatronics Engineering, 8(2), 1543–1553.
[25] Sutton, William G., and Rubin, Aviel D. "Cryptography." Microsoft® Student 2009
[DVD]. Redmond, WA: Microsoft Corporation, 2008. Microsoft ® Encarta ® 2009. © 1993-
2008 Microsoft Corporation. All rights reserved.

ResearchGate has not been able to resolve any citations for this publication.
ResearchGate has not been able to resolve any references for this publication.