Synthesis of Optimal Steganographic Method Meeting Given Criteria (original) (raw)

Steganography Literature Survey, Classification and Comparative Study

Communications on Applied Electronics, 2016

Transmitting confidential images between two channels suffer from hacking. Therefore, protecting confidentiality has become a very essential issue. Recently, several methods are developed to protect important information. The main idea is based on embedding important information in multimedia carrier such as: text, image, audio, and video. The developed methods may be classified as steganography and watermarking. Steganography aims to embed huge amount of secret data in multimedia carrier while watermarking aims to hid small amount of secret data in multimedia carrier. This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.

Analysis of Various Techniques of Steganography for Embedding and Securing Data

—Data has become vulnerable to attackers and viruses so that security of the data has become main purpose now days. The steganography is a proficient technique to secure the data and has a long history but now the steganography has changed a lot. In modern steganography the digital carrier, electronic text, disk space, network packets, digital images, digital videos, digital audio etc are used for hiding the data. This study is organized with an objective to have an overview to steganography and its various types. The techniques for image steganography are also discussed in this work.

Study of Steganographic Techniques for Data Hiding

Zenodo (CERN European Organization for Nuclear Research), 2022

Nowadays, the volume of data shared over the Internet is growing. As a result, data security is referred to as a major issue while processing data communications through the Internet. During communication procedures, everyone requires their data to remain secure. Steganography is the science and art of embedding audio, message, video, or image into another audio, image, video, or message to conceal it. It is used to secure confidential information from harmful attacks. This research offers a classification of digital steganography based on cover object categories, as well as a classification of steganalysis art. Image visual quality, structural similarity, mean square error, Image Fidelity, embedding capacity, and robustness are some of the important aspects of steganography. Researchers have made tremendous advances in the realm of digital steganography. Nonetheless, it is vital to emphasize the advantages and disadvantages of modern steganography techniques. This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.

Digital Image Steganography

international journal for research in applied science and engineering technology ijraset, 2020

Steganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others. Therefore, the goal is to hide the existence of the secret data. Using steganography techniques, secret data can be concealed within an appropriate multimedia carrier, such as, image, audio, text files; among which digital image is the most widely used carrier format. Different steganography techniques are available, some are more advanced than the others, having strong and weak points respectively. The suitable technique can be selected as per the application requirement. The main objectives of steganography are undetectability, untraceable, robustness, and capacity of secret data. These are the factors that make it different from techniques such as cryptography. This paper analysis the uses of steganography and its techniques. It additionally aims to determine which steganography technique is more suitable for a certain application.

A Proposed Method for Image Steganography

Research in Medical & Engineering Sciences, 2018

All security techniques try to maintain Confidentiality, Integrity and Availability-referred to as the CIA Triad of information security. Steganography also takes a real challenge in the field of security through data concealment. A Steganography System consists of two functions: embedding and extraction. The objective of the proposed work is to design robust algorithms which generate stego media, can carry large amount (capacity) of secret data without reducing imperceptibility.

A Survey of Image Steganography Techniques

Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stegoimage (generated image which is carrying a hidden message). In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.

RESEARCH OF THE CHARACTERISTICS OF A STEGANOGRAPHY ALGORITHM BASED ON LSB METHOD OF EMBEDDING INFORMATION IN IMAGES

The article deals with the steganography system which hides text inside images without losing data. The secret message is hidden in the cover image using Last Significant Bit (LSB) algorithm. To evaluate steganography system properties the measures like Signal-to-Noise Ratio (SNR), Peak Signal-to-Noise Ratio (PRSN), Mean Squared Error (MSE) and Structural Similarity Index for measuring (SSIM) are used. Experimental results show the advantages of the described steganography system.

An Innovative Approach in Steganography

2014

The secure data transmission over internet is achieved using Steganography. In this paper, a new algorithm based on the CPThas been proposed for data hiding in a image. Here, no is used key for embedding and extracting of data. It hides four bits in a block of size 5×5 by changing a maximum of two bit. Better visual quality can be achieved by the proposed algorithm. The experimental results demonstrate the proposed algorithm’s effectiveness in resistance to steganalysis with better visual quality. Simulation experiments show that the proposed watermarking algorithm mis robust and invisible against the common signal processing techniques including JEPG compressing, noise, low-pass filter, median filter, contrast enhance, and the geometric distortions of transpose, mirror reflection, rotation and scale..

A Survey on Image Steganography Techniques

International Journal of Computer Applications, 2014

Steganography is an important technique for information hiding in any digital object. Steganography technique is the science that includes communicating secret information in an appropriate digital multimedia cover objects such as audio, video and image files. The main objective of steganography is to hide the existence of the embedded data. Steganography technique has improved the security of existing data hiding techniques by the outstanding development in computational power. Objectives of steganography are Undetectability, robustness and capacity of the concealed data, these key factors that separate it from related techniques like cryptography and watermarking. This paper delivers a survey on digital images steganography and covering its fundamental concepts. The development of image steganographic methods in spatial representation, in JPEG format and also discuss the recent development in the field of image steganography. Specific generally used approaches for increasing steganographic security are summarized and significant research developments are also discussed.

A Review on Various Approaches of Image Steganography and Data Security

International Journal of Advanced Research in Computer Science and Software Engineering, 2018

Images are used as the popular cover objects for steganography. A message is embedded in a digital image through an embedding algorithm, using the secret key. In this process image is divided into different regions for the detection of least significant bits available in different images. The no. of bits that can be utilized for image enhancement depend upon the pixel intensity the low intensity pixel utilizes less no. of bits and pixel having a high intensity utilized maximum bits in the process of hiding the image. The issue in this is security for prevention image from stegnalysis attack and the secret data is available in such a manner as it transmitted.in this paper a review on various approaches have been done that has been used for embedding of secret information behind the cover object.