A Survey of Different Steganography Techniques | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 4, Volume 25, Issue 1, January 2016, Page 66-102 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2016.63662 | ||||
![]() | ||||
Authors | ||||
E. A. Elshazly1; Safey A. S. Abdelwahab1; R. M. Fikry1; O. Zahran2; S. M. Elaraby2; M. El-Kordy2 | ||||
1Engineering Dep., Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt. | ||||
2Electronics and Electrical Communications Engineering Dep., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt | ||||
Abstract | ||||
Steganography is defined as the art and science of embedding data in a cover object without leaving a remarkable track on the cover object, in other words it is the study of invisible communications. It is usually dealing with the methods of hiding the existence of data to be transmitted in such a way that, it remains confidential. The main objectives of steganography are high capacity of the hidden data, perceptual transparency (invisibility), temper resistance, undetectability, computation complexity and robustness. It is classified into three categories which are; pure (no key), secret key, public key steganography. According to the type of the cover object, there are different types of steganography which are; image, audio, video, network and text. In the image steganography, the secrecy can be achieved by hiding data into the cover image and generating the stego-image. According to the embedding techniques, there are different techniques of steganography which are those embedding in the spatial domain (substitution method), those embedding in the transform domain (frequency domain), spread spectrum techniques, distortion techniques, masking and filtering techniques, and cover generation techniques. Each of these techniques has its strengths and weaknesses for different algorithms. This paper presents a review of these techniques; the different algorithms, concepts, advantages and disadvantages. The steps of the different algorithms of these techniques will presented in details, with a comparison between all these techniques. The different applications of steganography, the attacks, and the robust image steganography against attacks are presented. Lastly, the future and the novel trends in steganography are presented. | ||||
References | ||||
xt-stroke-width: 0px; "> [1] S. Deepa and R. Umarani, "A Study on Digital Image Steganography", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol. 3, Issue 1, pp. 54 – 57, January 2013. [2] H. Al-Bahadili, "A Secure Block Permutation Image Steganography Algorithm", International Journal on Cryptography and Information Security (IJCIS), Vol. 3, No. 3, pp. 11 – 22, September 2013. [3] K. D. Megha, N. P. Vaidya and K. Patel, "Digital Watermarking: Data Hiding Techniques using DCT-DWT Algorithm", International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 2, Issue 6, pp. 2397 – 2402, June 2013. [4] G. Kaur and K. Kaur, "Digital Watermarking and Other Data Hiding Techniques", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 2, Issue 5, pp. 181 – 184, April 2013. [5] K. Challita and H. Farhat, "Combining Steganography and Cryptography: New Directions", International Journal on New Computer Architectures and Their Applications (IJNCAA), Vol. 1 Issue 1, pp. 199 – 208, 2011. [6] O. C. Abikoye, K. S. Adewole and A. J. Oladipupo, "Efficient Data Hiding System using Cryptography and Steganography", International Journal of Applied Information Systems (IJAIS), Volume 4, No. 11, pp. 6 – 11, December 2012. [7] M. K. I. Rahmani, K. Arora and N. Pal, "A Crypto-Steganography: A Survey", International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 5, No. 7, pp. 149 – 155, 2014. [8] A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, "Digital Image Steganography: Survey and Analysis of Current Methods", Signal Processing, Elsevier, Vol. 90, Issue 3, pp. 727 – 752, March 2010. [9] M. Juneja and P. S. Sandhu, "Data Hiding with Enhanced LSB Steganography and Cryptography for RGB Color Images", International Journal of Applied Research, Vol. 3, No. 5, pp. 118 – 120, May 2013. [10] C. P. Sumathi, T. Santanam and G. Umamaheswari, "A Study of Various Steganographic Techniques Used for Information Hiding", International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 4, No. 6, pp. 9 – 25, December 2013. [11] J. Kour and D. Verma, "Steganography Techniques –A Review Paper", International Journal of Emerging Research in Management & Technology, Vol. 3, Issue 5, pp. 132 – 135, May 2014. [12] F. M. Shelke, A. A. Dongre and P. D. Soni, "Comparison of Different Techniques for Steganography in Images", International Journal of -stroke-width: 0px; "> Application or Innovation in Engineering & Management (IJAIEM), Vol. 3, Issue 2, pp. 171 – 176, February 2014. [13] M. Umamaheswari, S. Sivasubramanian and S. Pandiarajan, "Analysis of Different Steganographic Algorithms for Secured Data Hiding", International Journal of Computer Science and Network Security (IJCSNS), Vol. 10, No. 8, pp. 154 – 160, August 2010. [14] R. G. Bal and P. Ezhilarasu, "An Efficient Safe and Secured Video Steganography Using Shadow Derivation", International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol. 2, Issue 3, pp. 3251 – 3258, March 2014. [15] A. Chadha, N. Satam, R. Sood and D. Bade, "An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution", International Journal of Computer Applications (IJCA), Vol. 77, No. 13, pp. 37 – 45, September 2013. [16] M. Nosrati, R. Karimi and M. Hariri, "An Introduction to Steganography Methods", World Applied Programming, Vol. 1, No. 3, pp. 191 – 195, August 2011. [17] T. Handel and M. Sandford, "Hiding Data in the OSI Network Model", Proceedings of the 1st International Workshop on Information Hiding, pp. 23 – 38, June 1996. [18] M. Hussain and M. Hussain, "A Survey of Image Steganography Techniques", International Journal of Advanced Science and Technology, Vol. 54, pp. 113 – 124, May 2013. [19] E. Dagar and S. Dagar, "Comparative Study of Various Steganography Techniques", International Journal of Emerging Engineering Research and Technology (IJEERT), Vol. 2, Issue 2, pp. 30 – 36, May 2014. [20] S. Singh and T. J. Siddiqui, "A Security Enhanced Robust Steganography Algorithm for Data Hiding", International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 3, No. 1, pp. 131- 139, May 2012. [21] A. A. El-Zoghabi, A. H. Yassin and H. H. Hussien, "Public Key Steganography using LSB Method with Chaotic Neural Network", International Journal of Computer Engineering and Technology (IJCET), Vol. 5, Issue 8, pp. 118 – 129, August 2014. [22] Z. Kh. AL-Ani, A. A. Zaidan, B .B. Zaidan and H. O. Alanazi, "Overview: Main Fundamentals for Steganography", Journal of Computing, Vol. 2, Issue 3, pp. 158 – 165, March 2010. [23] M. Mishra, P. Mishra and M. C. Adhikary, "Digital Image Data Hiding Techniques: A Comparative Study", ANSVESA, Vol. 7, No. 2, pp. 105- 115, 2012. [24] Chetan, D. Sharma, "A Survey of Image Compression and Steganography Techniques", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol. 5, Issue 4, pp. 727 – | ||||
Statistics Article View: 380 |
||||