Preview

Image Steganography Techniques

Best Essays
Open Document
Open Document
2772 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Image Steganography Techniques
Image Steganography Techniques: Hiding messages in Images

Introduction
The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. There are 5 kinds of Steganography: Text, Image, Audio/Video and Protocol (Joshi, R. et al. 2013). The term Steganography refers to the art of covert communications. By implementing steganography, it is possible for Alice to send a secret message to Bob in such a way that no-one else will know that the message exists (Bateman, P. and Schaathun, H. 2008).

Images are considered as the most popular file formats used in steganography. They are known for constituting a non-causal medium, due to the possibility to access any pixel of the image at random. In addition, the hidden information could remain invisible to the eye. However, the image steganography techniques will exploit "holes" in the Human Visual System (Hamid, N. et al. 2012)

Scientific Review
As the computer, the internet and the Digital Signal Processing (DSP) started to boost, steganography has gone digital (Cheddad, A. and Condell, J. 2010). The popular images to try steganography are binary images and 3D images and steganography for such types of images have shown a lot of progress but researchers focus on using grey-scale and colour images to hide data. Grey-scale images are preferred over colour images as it is easy to detect the route of encryption because of the disturbances of correlations between colour components (Li, B. and He, J. 2011).

There are various techniques used for Image steganography which are performed on various formats of images. Some of the techniques include:

Least Significant Bit technique – In this method, the image is scanned row wise and it is encoded in binary. Then, the message is also encoded in binary. The image size and the message size are compared. Once done, a random pixel from the image is chosen and is divided into three parts i.e.



Bibliography: Bateman, P. and Schaathun, H. (2008). Image Steganography And Steganalysis. [online] Retrieved from: http://www.computing.surrey.ac.uk/personal/st/H.Schaathun/projects/Past/phil-msc.pdf [Accessed: 21 Feb 2013]. Li, B. and He, J. (2011). A Survey On Image Steganography And Steganalysis. [online] Retrieved from: http://bit.kuas.edu.tw/~jihmsp/2011/vol2/JIH-MSP-2011-03-005.pdf [Accessed: 21 Feb 2013]. Al-Shatnawi , A. (2012). A New Method In Image Steganography With Improved Image Quality. [online] Retrieved from: http://www.m-hikari.com/ams/ams-2012/ams-77-80-2012/alshatnawiAMS77-80-2012.pdf [Accessed: 21 Feb 2013]. Cheddad, A. and Condell, J. (2010). Digital Image Steganography: Survey And Analysis Of Current Methods. [online] Retrieved from: http://www.abbascheddad.net/Survey.pdf [Accessed: 21 Feb 2013]. Christaline, J. and Vaishali, D. (2011). Image Steganographic Techniques With Improved Embedding Capacity And Robustness. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5972288 [Accessed: 17 Feb 2013]. Gutub, A. et al. (2009). Triple-A: Secure RGB Image Steganography Based On Randomization. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5069356 [Accessed: 21 Feb 2013]. Hamid, N. et al. (2012). Image Steganography Techniques: An Overview. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJCSS/volume6/Issue3/IJCSS-670.pdf [Accessed: 21 Feb 2013]. Hmood, D. et al. (2012). A New Steganographic Method For Embedded Image In Audio File. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJCSS/volume6/Issue2/IJCSS-633.pdf [Accessed: 17 Feb 2013]. Ibrahim, R. and Kuan, T. (2011). Steganography Algorithm To Hide Secret Message Inside An Image. [online] Retrieved from: http://arxiv.org/ftp/arxiv/papers/1112/1112.2809.pdf [Accessed: 17 Feb 2013]. Joshi, R. et al. (2013). Image Steganography. [online] Retrieved from: http://ijarcet.org/index.php/ijarcet/article/view/674/pdf [Accessed: 17 Feb 2013]. Juneja, M. and Sandhu, P. (2009). Designing Of Robust Image Steganography Technique Based On LSB Insertion And Encryption. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5329453 [Accessed: 21 Feb 2013]. Keshari, S. and Modani, G. (2011). Weighted Fractional Fourier Transform based Image Steganography. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6146870 [Accessed: 17 Feb 2013]. Kumar, M. and Newman, R. (2009). J3: High Payload Histogram Neutral JPEG Steganography. [online] Retrieved from: http://www.cise.ufl.edu/~nemo/tmp/j3_5.pdf [Accessed: 21 Feb 2013]. Li, B. et al. (2008). Textural Features Based Universal Steganalysis. [online] Retrieved from: http://144.206.159.178/ft/CONF/16408889/16408927.pdf [Accessed: 17 Feb 2013]. Luo, W. and Huang, J. (2010). Edge Adaptive Image Steganography Based On LSB Matching Revisited. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5411758 [Accessed: 17 Feb 2013]. Nag, A. et al. (2010). A Novel Technique For Image Steganography Based On Block-DCT And Huffman Encoding. [online] Retrieved from: http://arxiv.org/ftp/arxiv/papers/1006/1006.1186.pdf [Accessed: 21 Feb 2013]. Pandian, N. and Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy Using Hufman Encoding. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJIP/volume6/Issue5/IJIP-665.pdf [Accessed: 17 Feb 2013]. Parvez, M. and Gutub, A. (2008). RGB Intensity Based Variable-Bits Image Steganography. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4780862 [Accessed: 21 Feb 2013]. Rao, S. et al. (2011). Secure Image Steganography Based On Randomized Sequence Of Cipher Bits. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5945256 [Accessed: 17 Feb 2013]. Sarreshtedari, S. and Ghaemmaghami, S. (2010). High Capacity Image Steganography In Wavelet Domain. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5421800 [Accessed: 21 Feb 2013]. Singh, P. and Pujara, C. (2012). Comparative Study Of Various Techniques Employ In Image Steganography. [online] Retrieved from: http://www.ijeat.org/attachments/File/v1i5/E0384051512.pdf [Accessed: 17 Feb 2013]. Suresh, K. et al. (2008). Authentication Of Secret Information In Image Steganography. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4766581 [Accessed: 14 Feb 2013]. Yadav, R. et al. (2011). A Novel Approach For Image Steganography In Spatial DoMain Using Last Two Bits Of Pixel Value. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJS/volume5/Issue2/IJS-77.pdf [Accessed: 17 Feb 2013]. Yu, J. et al. (2008). A New Image Steganography Based On 2k Correction And Edge-Detection. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4492540&tag=1 [Accessed: 21 Feb 2013]. Zhang, H. et al. (2009). Image Steganography Using Pixel-Value Differencing. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5209914 [Accessed: 21 Feb 2013]. Zhou, Y. and Agaian, S. (2011). Image Encryption Using the Image Steganography Concept And PLIP Model. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961993 [Accessed: 14 Feb 2013].

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Tilborg, H. (2002). Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. If I was an intelligence officer, something I could learn from this weak encryption is that if I need to send a message, I need to definitely use something more complex, because when using substitution, once someone catches on to the pattern, it will get easier and easier to code the message . Honestly, I would use stenography as much as possible.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Governments may want to use it to for covert missions. They can let their troops in a different area know what the next move should be in a war. Criminals might also use steganography. Some people think that steganography may have been a tool used by the people that planned the attacks on 9-11. Also, some people think there may have been hidden messages in the videos that were circulating that Osama bin Laden appeared in (Kessler, 2001). Appallingly, child pornographers may use steganography to hide files. A positive use for steganography would be for artists and photographers who want to make sure their copyrighted materials do not get stolen is to add a watermark to their…

    • 789 Words
    • 4 Pages
    Better Essays
  • Better Essays

    is taken, the cameras attach a coded signature that is destroyed if the image is modified and resaved. An…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Digital Forensics Essay

    • 1416 Words
    • 6 Pages

    The main significance of digital forensics is to identify the proof of a crime, it is able to be utilized to facts to particular suspect, affirm explanations or articulations, focus goal, distinguish sources or authenticate documents. The forensic tools can help us to identify potential digital evidence. In addition to the identification of evidence of murders, terrorism, where the tools are used commonly but it is also used in other types of crime such as child pornography or stalking. Also helps to guarantee the overall reliability and survivability of the network infrastructure. Considerate the lawful and specialized parts of…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Powerful Essays

    Besides these three, deception can take many other forms as well. The most common according to Braun (1988, p.77-83) involves the manipulation of photographs which appears to depict falsely and mislead the viewer to believing something else. The unethical and deceptive use of hidden cameras has also caused charges and arrests of many media industries. Such was the case of ABC TV, as Richard (2005) talk about how ABC charged a food chain with deliberately selling spoiled food by placing hidden cameras in Food Lion’s factory and showing evidence of it. ABC came under disgrace when it was found by a jury of 12 Carolinians found that they got the story by fraud, and in essence that it had violated the standards by which decent people live and…

    • 2010 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4).…

    • 928 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    English Vocab List

    • 827 Words
    • 7 Pages

    Obscene- Of the portrayal or description of sexual matters, offensive or disgusting by accepted standards of morality and decency.…

    • 827 Words
    • 7 Pages
    Satisfactory Essays