A Survey on various types of Steganography and Analysis of Hiding Techniques

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-11 Number-8
Year of Publication : 2014
Authors : Navneet Kaur , Sunny Behal
  10.14445/22315381/IJETT-V11P276

Citation 

Navneet Kaur , Sunny Behal. "A Survey on various types of Steganography and Analysis of Hiding Techniques", International Journal of Engineering Trends and Technology (IJETT), V11(8),388-392 May 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Digital Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. Under this assumption, if the feature is visible, the point of attack is evident, thus the here goal is conceal to the existence of the embedded data .This is totally review paper, in which we provide the comparison of available steganography technology hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography. The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego -image is transformed from spatial domain to the frequency domain.

References

[1] Artz, Donovan. "Digital steganography: hiding data within data." internet computing, IEEE 5.3 (2001): 75-80.
[2] Amin, Muhalim Mohamed, et al. "Information hiding using steganography." Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference on. IEEE, 2003.
[3] Shashikala Channalli, Ajay Jadhav, “Steganography An Art of Hiding Data” International Journal on Computer Science and Engineering Vol.1(3), 2009, 137-141
[4] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview of image steganography." ISSA. 2005.
[5] Yuk Ying Chung, fang Fei Xu , “Development of video watermarking for MPEG2 video” City university of Hong Kong ,IEEE 2006.
[6] Singh, Nanhay, Bhoopesh Singh Bhati, and R. S. Raw. "Digital image Steganalysis for computer forensic investigation." Computer Science and Information Technology (CSIT) (2012): 161-168..
[7] AL-Shatnawi, Atallah M., and Bader M. AlFawwaz. "An Integrated Image Steganography System with Improved Image Quality." Applied Mathematical Sciences 7.71 (2013): 3545-3553.
[8] Bhattacharyya, Souvik and Gautam Sanyal. "A Robust Image Steganography using DWT Difference Modulation (DWTDM)." International Journal of Computer network & Information Security 4.7 (2012)..
[9] K. Bennett, “Linguistic Steganography: survey, analysis, and robustness concerns for hiding information in text” center for Education and Research in Information Assurance and Security,Purdue University 2004.
[10] Hitesh Singh, Pradeep Kumar Singh, Kriti saroha “A Survey on Text Based Steganography” Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development, February 26 – 27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and Management, Ne w Delhi.
[11] Hitesh Singh, Pradeep Kumar Singh, Kriti Saroha “A Survey on Text Based Steganography” Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development, February 26 – 27, 2009 Bharati Vidyapeeth’s Institute of Computer Applications and Management, Ne w Delhi
[12] Jain, Nitin, Sachin Mesh ram, and Shikha Dubey. "Image Steganography Using LSB and Edge–Detection Technique. " International Journal of Soft Computing and Engineering (IJSCE) ISSN (2012): 2231-2307.
[13] M. M. Amin, M. Salleh, S. Ibrahim, M.R. Katmin, M.Z.I. Shamsuddin, “Information Hiding using Steganography” Proceedings of 4th National Conference on Telecommunication Technology, Shah Alam , Malaysia, 2003.
[14] Amin, Mohamed “Muhalim and Ibrahim, Subariah and Salleh, Mazleena and Katmin, Mohd rozi (2003) Information hiding using steganography.
[15] Ibrahim, Rosziati, and Teoh suk Kuan. "Steganography Algorithm to hide secret message inside an Image." arXiv preprint arXiv: 1112.2809 (2011).
[16] Jenkins, Neil, and Jean Everson Martina "Steganography in audio." University of Cambridge CST Part II Dissertation (2009) ..
[17] Nosrati, Masoud, Ronak Karimi, and Mehdi Hariri. "Audio Steganography: A Survey on Recent Approaches." World Applied Programming 2.3 (2012): 202-205..
[18] Dutta, Poulami, Debnath Bhattacharyya, and Tai-hoon Kim. "Data hiding in audio signal: A review." International journal of database theory and application2.2 (2009): 1-8..
[19] H.B.kekre , Archana Athawale , “Information Hiding In Audio Signal”.Intertional Journal of Computer Application volume 7-No.9 October 2010.
[20] Sohag, Saeed Ahmed, Md Kabirul Islam, and Md Baharul Islam. "A Novel Approach for Image Steganography Using Dynamic Substitution and Secret key. "
[21] Goel, Arun Rana, and Stuti Manpreet Kaur. "A Review of Comparison Techniques of Image Steganography. " Global Journal of Computer Science and Technology 13.4 (2013) .
[22] AL- Shatnawi, Atallah M., and Bader M. AlFawwaz. “An Integrated Image Steganography System with Improved Image Quality." Applied Mathematical Sciences 7.71 (2013): 3545-3553..
[23] Bhattacharyya, Souvik, and Gautam Sanyal. "A Robust Image Steganography using DWT Difference Modulation (DWTDM)." International Journal of Computer Network & Information Security 4.7 (2012) .
[24] Saddaf rubab and M Younus article: Improved Image Steganography Technique for Colored Images using Wavelet Transform. International Journal of Computer Applications 39(14):29-32, February 2012. Published by Foundation of Computer Science, New York, USA.
[25] Banik Bamali Gupta and Samir K Bandvopadhvay ” A DWT Method for Image Steganography “International Journal 3.6(2013)

Keywords
Steganography, Cryptography, Least Significant Bit (LSB); Discrete Cosine Transform (DCT); Discrete Wavelet Transform (DWT).