Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file
DOI:
https://doi.org/10.32628/CSEIT24103107Keywords:
Digital Steganography, Data Hiding, Least Significant Bit, Deep Learning in Steganography, Cover File, Secret Data Embedding, Covert CommunicationAbstract
This research paper offers an in-depth examination of digital steganography, with a focus on the diverse methodologies utilized for embedding secret data within cover files. Steganography, the practice of concealing information within other non-secret data, ensures the hidden message remains undetectable to unauthorized observers. This study systematically reviews both traditional and modern steganographic techniques, dissecting their fundamental mechanisms, advantages, and weaknesses. Techniques explored include Least Significant Bit (LSB) insertion, discrete cosine transform (DCT), discrete wavelet transform (DWT), and innovative methods leveraging deep learning and adaptive algorithms. Each method is assessed for its imperceptibility, robustness, and data capacity, offering a comparative analysis to underscore their respective practical applications and limitations. Additionally, the paper delves into steganalysis—methods for detecting hidden information—to provide a comprehensive perspective on the field. Through experimental evaluation and theoretical analysis, this study seeks to enhance the understanding of digital steganography, presenting insights that could inform future research and the development of more secure data hiding techniques.
Downloads
References
Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File, Joyshree Nath, Saima Ghosh and Asoke Nath, International Journal of Computer Applications(IJCA 0975-8887), Vol 46, No-14, May ,(2012).
Advanced steganographic approach for hiding encrypted secret message in LSB, LSB+1, LSB+2 and LSB+3 bits in non standard cover files: Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications, Vol14-No.7,Page-31-35, Feb(2011). DOI: https://doi.org/10.5120/1894-2522
AsokeNath,SankarDas,SamriddhiJoshi,SoulatDaanyaalAlam,AlvinRoetgen“Steganography Algorithm to Hide any Secret Message inside an Audio File”, International Journal of Innovative Research in Computer and CommunicationEngineering(IJIRCCE),ISSN(Online):2320-9801, ISSN(Print): 2320-9798, Vol 4, Issue 5, Page :8904-8910 ,May, 2016.
Advanced Steganography Algorithm using encrypted secret message : Joyshree Nath and Asoke Nath, International Journal of Advanced Computer Science and Applications, Vol-2, No-3, Page-19-24, March(2011). DOI: https://doi.org/10.14569/IJACSA.2011.020304
Thenmozhi, M. J., &Menakadevi, T. A New SecureImage Steganography Using LsbAndSpihtBasedCompression Method. International Journal ofEngineering, 16(17), (2016).
Mandal, J. K., & Das, D. Colour image steganographybased on pixel value differencing in spatialdomain. International journal of information sciences and techniques, 2(4), (2012). DOI: https://doi.org/10.5121/ijist.2012.2408
Artz, D. Digital steganography: hiding data within data. IEEE Internet computing, 5(3), 75-80, (2001). DOI: https://doi.org/10.1109/4236.935180
Kaur, G., &Kochhar, A. Asteganographyimplementation based on LSB & DCT. InternationalJournal for Science and Emerging Technologies withLatest Trends, 4(1), pp.35-41, (2012).
Shabnam, S. ,&Hemachandran , K. LSB basedSteganography using Bit masking method on RGBplanes. (IJCSIT) International Journal of ComputerScience and Information Technologies, 7 (3) , pp.1169-1173, ( 2016)
Pritha Roy, Asoke Nath, “New Steganography approach using encrypted secret message inside Audio and Video media” ,International Journal of Advance
Research in Computer Science and Management Studies(IJARCSMS, ISSN: 23717782), Volume 2, Issue 12, Dec 31, Page: 46-59(2014).
Emam, M. M., Aly, A. A., &Omara, F. A. An Improved Image Steganography Method Based on LSB Techniquewith Random Pixel Selection. International Journal ofAdvanced Computer Science & Applications, 1(7), pp.361-366, (2016). DOI: https://doi.org/10.14569/IJACSA.2016.070350
R. Das and T. Tuithung, "A novel steganography method for image based on Huffman encoding", Proc. 3rd Nat. Conf. Emerg. Trends Appl. Comput. Sci., pp. 14-18, Mar. 2012. DOI: https://doi.org/10.1109/NCETACS.2012.6203290
N. Patel and S. Meena, "LSB based image steganography using dynamic key cryptography", Proc. Int. Conf. Emerg. Trends Commun. Technol. (ETCT), pp. 1-5, Nov. 2016. DOI: https://doi.org/10.1109/ETCT.2016.7882955
M. B. Tuieb, M. Z. Abdullah and N. S. Abdul-Razaq, "An efficiency secured and reversible video steganography approach based on lest significant", J. Cellular Automata, vol. 16, no. 17, Apr. 2020.
O. Elharrouss, N. Almaadeed and S. Al-Maadeed, "An image steganography approach based on k-least significant bits (k-LSB)", Proc. IEEE Int. Conf. Informat. IoT Enabling Technol. (ICIoT), pp. 131-135, Feb. 2020. DOI: https://doi.org/10.1109/ICIoT48696.2020.9089566
R. A. Santosa, P. Bao," Audio-to-Image Wavelet Transform based Audio Steganography", 47th International Symposium ELMAR-2005 , 08-10 June 2005, Zadar, Croatia, pp 209-212 DOI: https://doi.org/10.1109/ELMAR.2005.193679
Dr. Ekta Walia, Payal Jain, Navdeep, ―An Analysis of LSB & DCT based Steganography‖, Global Journal of Computer Science and Technology, Volume 10 Issue 1, April 2010, pg. 4-8.
Gupta Banik, B and Bandyopadhyay, S K, ―An Image Steganography Method on Edge Detection Using Multiple LSB Modification Technique‖, Journal of Basic and Applied Research International, International Knowledge Press, Volume 9 Issue 2 pp. 75-80.
Bilal, Ifra, Rajiv Kumar, Mahendra Singh Roj, and P K Mishra. ―Recent Advancement in Audio Steganography‖, pp. 402–405, Publisher IEEE, 2014. DOI:10.1109/PDGC.2014.7030779 DOI: https://doi.org/10.1109/PDGC.2014.7030779
Dalal M., Juneja M. (2018) ―Video Steganography Techniques in Spatial Domain—A Survey‖, in: Mandal J., Saha G., Kandar D., Maji A. (eds) Proceedings of the International Conference on Computing and Communication Systems, Lecture Notes in Networks and Systems, Volume 24. Publisher Springer, Singapore DOI:10.1007/978-981-10-6890-4_6 DOI: https://doi.org/10.1007/978-981-10-6890-4_67
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.