Hiding Secret Data Using Image Steganography

Authors

  • Paridhi Tutlani  M. Tech Scholar, CSE, I.G.U Rewari, SCET Mahendergarh, Haryana, India
  • Mrs. Priyanka  Assistant Professor, CSE, I.G.U Rewari, SCET Mahendergarh, Haryana, India

DOI:

https://doi.org//10.32628/CSEIT119548

Keywords:

Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So, the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend recipient, suspects the existence of the message, a form of security through obscurity. Hiding Secret Data Using Image Steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as image file. In this paper we mainly discuss different types of image steganographic methods, advantages and disadvantages. We focus in this paper on Hiding Secret Data Using Image Steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital image steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. The primary goal of steganography is to reliably send hidden information secretly, not merely to obscure its presence. Steganography in today’s computer era is considered a sub-discipline of data communication security domain. Lately, new directions based on steganographic approaches started to emerge to ensure data secrecy. Rather than as a substitute to existing solutions, these approaches could achieve better data secrecy if combined with conventional security techniques. Modern techniques of steganography exploit the characteristics of digital media by utilizing them as carriers (covers) to hold hidden information.

Abstract

Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So, the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend recipient, suspects the existence of the message, a form of security through obscurity. Hiding Secret Data Using Image Steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as image file. In this paper we mainly discuss different types of image steganographic methods, advantages and disadvantages. We focus in this paper on Hiding Secret Data Using Image Steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital image steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. The primary goal of steganography is to reliably send hidden information secretly, not merely to obscure its presence. Steganography in today’s computer era is considered a sub-discipline of data communication security domain. Lately, new directions based on steganographic approaches started to emerge to ensure data secrecy. Rather than as a substitute to existing solutions, these approaches could achieve better data secrecy if combined with conventional security techniques. Modern techniques of steganography exploit the characteristics of digital media by utilizing them as carriers (covers) to hold hidden information.

References

  1. W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, "Data Hints", IBM Systems Journal, Volume 39, Issue 3-4, July 2000, p. 547 - 568.
  2. Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Debashis Ganguly Swarnendu Mukherjee, "Steganography Teaching Tutorial", International Conference Contemporary Computing (IC3-2008), Noida, India, August 7, 2008, p. 105-114.
  3. Robert Krenn, "Steganography and Steganalysis", Article, January 2004.
  4. Nedeljko Cvejic, Tapio Seppben "Increasing LSB capacity based on concealing confidential data using Steganography image" FIN90014 University of Oulu, Finland, 2002.
  5. Sajad Shirali-Shahreza M.T. Manzuri-Shalmani "A high-level communication error on a domain's wavelet domain steganography "ICASSP 2008
  6. Neil F.Johnson, Z.Duric and S.Jajodia. "Steganography hiding and Watermarking attacks." and monitoring ", the Kluwer Academic Publishers, in 2001
  7. F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn: "Hiding Information-Testing", The IEEE process, vol.87, no.7, p. 1062-1078, in July, 1999.
  8. Min Wu, Bede Liu. "Multimedia Data Hiding", New Springer-Verlag in New York, in 2003.
  9. N. Port-Delgarm, "Watermarking Talk", MSS. Thesis, Comptuer Engineering Department, Sharif University of Technology, Tehran, IRAN, May 2006.
  10. M. Pooyan, A. Delforouzi, "LSB encrypted data by using the Steganography image A method based on the raising of Wavelet Convert ", Proc. Ith IEEE International International Symposium for Processing Processing and Information Technology (ISSPIT'07), December 2007, Egypt.
  11. R. A. Santosa and P. Them, "wave-to-image conversion-based conversion based on Hide Data Data Using the Image Steganography," Mc. of 47 Int. Symposium ELMAR, June 2005, p. 209- 212.
  12. Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe. "Real-Time Steganography Based on Audio-to-Audio Data Bit Stream ", IEICE, ISEC, vol.106 pp.15-22, September 2006.
  13. Aoki, Naofumi. "VoIP Network Connection Process Using Steganography Technology", IEICE, SP, 106 (333), pp.31-36, 2006.
  14. Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe International Conference on Intelligent "Hiding Information and Multimedia Isign Processing Processing" © 2008 IEEE.
  15. A. Delforouz, Mohammad Pooyan, "Adaptive Digital Hiding Data Hidden Data Using Steganography Image Based on waveglegraphic integer modify ", IEEE Third Conference of the World of Work Secret Information & Multimedia Spot Analysis, 2007, 26-28 Nov 2007, p 283-286.
  16. R. A. Santosa, P. Bao, "Conversion of the Transform Audio-to-Image based on a hidden image by using a Steganography image", 47th International Symposium ELMAR-2005, 08-10 June 2005, Zadar, Croatia, pp 209-212.
  17. S. Shirali-Shahreza, Mr. T. Manzuri-Shalmani, "Transformed Wavelet Domain to Hide Password Data Using Image Steganography Capacity High and Error Low Rate ", the IEEE International Conference on Information and Emerging Technology, 2007, 06-07 July 2007 p 1-5.
  18. Yincheng Qi, Jianwen Fu, and Jinsha Yuan, "Wavelet of the steganalysis base based database" histogram times, "Journal of System Simulation, Vol. 20, No. 7, p. 1912-1914, April 2008.
  19. Yin-cheng qi, liang ye, chong liu "stevealysis of Wavelet domain audio repetition model "International Conference of 2009 Conference on Analysis Wavelet and the Prophet Recognition, Analysis, 12-15 July 2009.
  20. V. Vapnik, "Statistical Learning Theory", John Wiley, 2008.
  21. Mengyu Qiao, Andrew H. Sung, Qingzhong Liu "Feature Mining and Intelligent Computing for MP3 Steganalysis "The United Nations Summit on Bioinformatics, Systems Biology and Intelligent Computer 2009.

Downloads

Published

2019-07-30

Issue

Section

Research Articles

How to Cite

[1]
Paridhi Tutlani, Mrs. Priyanka, " Hiding Secret Data Using Image Steganography, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 4, pp.65-70, July-August-2019. Available at doi : https://doi.org/10.32628/CSEIT119548