Anda di halaman 1dari 6

Inaam Ali Naseer, School of Science and Technology University of Management and Technology, Lahore,

Research paper of Steganography – A Comprehension Comparative


Pakistan,15009065146@umt.edu.pk
1

Keneth, School of Science andofTechnology


Different Techniques
University of Management and Technology, Lahore,
Pakistan,150090651@umt.edu.pk

Abstract As very few of us know that steganography is art and science of hiding the information. Information would be in
every form like text, audio, video and images. Steganography is the most important area of research in recent year. This
technique is been started used in different applications where admin or owner of the data needs to hide their important
information’s. It is the science of embedding information into the cover image as well as text, and video without disturbing the
real information. The steganography technique created a challenging task of transferring the embedded information to the
destination without being detected. This paper deals with hiding text in different mediums using different techniques and
comprehension comparative of that techniques.

Fig (1.1) Steganography Types

I. INTRODUCTION1

First of all the word ‘Steganography’ is the Greek word.


‘Stego’ meaning ‘Cover’ and the word ‘Grafia’ meaning is
‘Writing’ which represent as ‘Cover Writing’. In old times
people send data or important information using letters and
books. In those old days people also use some different
ways to secure their data or information. Data security is
very big deal now days too because now we are living in
the era where people are surrounding by advance
technology like internet, computer, mobile etc. As we know
these devices very helpful in sending data from one user to
other user but data leakage or hacking also very big
problem. Hackers hack into other person systems and can
easily excess their secure data. To deal with these problem Fig (1.1) Working of LSB Technique
scientists introduced the method ‘Steganography’. There
are many method or techniques in steganography like
spatial domain, transform domain, spread spectrum, vector
embedding, masking and filtering, distortion and lastly II.STEGANOGRAPHY IN DIGITAL MEDIUMS
statistical. These are the technique helpful in making our There are five digital mediums where steganography is
communications secure. commonly used to hide the data. The list of those five
mediums is following:
 Text Steganography
 Image Steganography
 Network Steganography
 Audio Steganography
 Video Steganography

1
2

III. TEXT STEGANOGRAPHY


The techniques which are used in text steganography are Fig (3.1) Image
numbers of tabs, white spaces, and capital letters, just like Steganography
Morse code which is used to achieve or decide the hiding
information in the text.

Fig (2.1) Text Steganography

A.IMAGE STEGANOGRAPHY

In image steganography pixels are used to hide the


secret information. The 8 and 16 bit images are most
common images in used in image steganography
technique. The large images required compressions to
avoid the detection of hiding data. LSB, BPC and PVD are
some common techniques which are usually used in image
compression method.
3

B.NETWORK STEGANOGRAPHY pictures; these pictures are used as carrier for hiding
In network steganography where taking cover objects as information or data. This technique can be used in
network like TCP, UDP and IP etc., where protocol is following types of format like H.264, MP4, MPEG and AVI
commonly used as carrier is usually called network video formats
protocol steganography.

Fig (3.4) Video Stegmography

Fig (3.2) Network Steganography 3. Techniques of Steganography


C. AUDIO STEGANOGRAPHY
In audio steganography taking audio as source for hiding
the information is usually called audio steganography. This
is the one of the most important medium of secret data
transferring due to VOIP (Voice over internet protocol)
technique popularity, audio steganography is considers as
most reliable source among all methods. This technique
can be used in following types of audio format like WAVE,
MP3, and MIDI etc.

Fig (3.3) Audio Steganography

D.VIDEO STEGANOGRAPHY
Video steganography is the technique which is used to hide
any kind of files as well as information into digital video
format. Video which is the combination of different
4

transformation (DCT), discrete wavelet transformation


(DWT)

Discrete Fourier Transform (DFT):


The Discrete Time Fourier transforms uses the discrete
time but it converts into the continuous frequency. The
algorithm for computing the DFT is very fast on modern
computers. This algorithm is known as Fast Fourier
Transform i.e. FFT

Discrete Cosine Transform (DCT):


Discrete cosine transform technique is similar to discrete
Fourier transformation, like discrete Fourier
transformation, discrete cosine transforms the signal or
image from spatial domain to the frequency domain. The
DCT is used in steganography as the Image is broken into
8×8 pixel blocks and transforms these pixel blocks into 64
DCT. Working from left to right, up to down, the DCT is
applied to each block. When desired, image is
reconstructed through decompression, a process that uses
the Inverse discrete
Cosine transform that is Inverse Discrete Cosine Transform
(IDCT)
Table (4.3) Comparison between LSB Techniques
4.1 (4.1)
Fig Spatial Domain Methods
Techniques of Steganography Discrete Wavelet Transform (DWT):
This technique is also used to transform the image from a
Spatial domain steganography known as one of the direct spatial domain to the frequency domain. In the process of
method of object steganography. In spatial domain steganography DWT identifies the high frequency and low
steganography data hiding process is done directly on the frequency information of each pixel of the image. This
pixels of the image. Spatial domain method applied on technique provides both frequency and spatial description
image pixels in such a way that the effect of hiding
message is not visible on cover image. The spatial domain
methods are classified as following:

LSB: LSB is one the techniques of spatial domain


methods. In LSB transformation some least significant bits
are change directly in the image pixel values in hiding the
data. A change in the image pixels value in LSB technique
is not visible for human eyes.

PVD: In PVD (Pixel Value Differencing) two consecutive


pixels are selected from the image for hiding the data or
information. In PVD pixels are mostly selected from
smooth area or from edges. In this method payload plays
an important role.

BPC: The binary pattern complexity method is used to


measure the noise factor in the image. Through this
technique noisy portion of the image replaced with binary
pattern, and it is mapped with hidden data or information.

4.2 Transform Domain Steganography

Transform domain steganography is the more complex


method or technique to hide the data/information in an
image. In transform domain steganography differ
algorithms and transformations are used to hide the
information into an image. Transform domain techniques
are not depend on the image format. Transform domain
steganography have differ kind of various categories such
as Discrete Fourier transformation (DFT), discrete cosine
5

of the image. Wavelets are created by translations and


dilations of a fixed function are known as mother wavelet.
According to research DWT is much better technique as
compare to DFT and DCT, because it multi resolution
description of any image.

4.3 Spread spectrum


6. References
The concept of spread spectrum is used in this technique. [1] Vasco Pereira and Tiago Sousa, “Evolution of
In this method the secret data is spread over a wide Mobile Communications: from 1G to 4G”, in Proc. Of
frequency bandwidth. The ratio of signal to noise in every
The 2nd International Working Conference on
frequency band must be so small that it becomes difficult to
detect the presence of data. This is one of the most solid Performance Modeling and Evaluation of
techniques of steganography which is usually used in the Heterogeneous Networks, HET-NETs’04, West
field of military communication. Yorkshire, U.K., July 2004
[2]
4. Conclusion & Future Work http://studentweb.niu.edu/9/~Z172699/Description.ht
ml
This paper completely bases on the comprehensive [3] M. Pavani1, S. Naganjaneyulu, C. Nagaraju, ”A
comparative of different steganography techniques. After Survey on LSB Based Steganography Methods”
studding all the techniques of steganography, this field International Journal Of Engineering And Computer
needs more efficient and accurate algorithms for better Science ISSN:2319-7242 Volume 2 Issue 8 August,
security. In the field of steganography still many efforts 2013 Page No. 2464-2467
have to be made to increase the embedding capacity and [4] P. Chen and H. Lin, “A DWT Based Approach for
maintain secrecy of the data. Efforts are also be made to Image Steganography,” Int. J. of Applied Sci. Eng.,
hide text files having big size than image size for better vol. 4, no. 3, pp. 275–290, (2006)
transfer of the data. This shows that we can use these [5] G. Kaur and A. Kochhar, “A Steganography
techniques in various field like military medical, anti- Implementation based on LSB & DCT,” vol. 4, no. 1,
criminal organization digital forensic and so on. At the end pp. 35–41, (2012)
we can easily say that image steganography is the Yang, Chunfang., Liu, Fenlin., Luo, Xiangyang., and
technique of secret communication which has received Zeng, Ying., “Pixel Group Trace Model-Based
much attention because steganography is a technique that Quantitative
can hide data with a low detection rate and high payload. Steganalysis for Multiple Least-Significant Bits
Steganography”, IEEE Transactions on Information
Forensics and
Security, Vol. 8, No. 1, January 2013.
[6] Swati malik, Ajit “Securing Data by Using
Cryptography with Steganography” International
Journal of
Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 5, May 2013
[7] Ishwarjot Singh ,J.P Raina,“ Advance Scheme for
Secret Data Hiding System using Hop field & LSB”
International
Journal of Computer Trends and Technology (IJCTT)
– volume 4 Issue 7–July 2013.
[8] G. Manikandan, N. Sairam and M. Kamarasan “A
Hybrid Approach for Security Enhancement by
Compressed
Crypto-Stegno Scheme “, Research Journal of Applied
Sciences, Engineering and Technology 4(6): 608-614,
2012
[9] Shabir A. Parah, Javaid A. Sheikh, G.M. Bhat,
“Data Hiding in Intermediate Significant Bit Planes, A
High
Capacity Blind Steganographic Technique”,
International Conference on Emerging Trends in
Science,
6

Engineering and Technology , pp.192-197, July 2012.

[10] Michel K. Kulhandjian, Dimitris A. Pados, Ming


Li, Stella N. Batalama, and Michael J. Medley,
“Extracting
spread-spectrum hidden data from digital media “,
IEEE transactions on information forensics and
security, vol. 8,
no. 7, july 2013.
[11] Chang, Chin-Chen., Lin, Iuan-Chang., and Yaun-
Hui YU., “ A new Steganographic method for color
and gray
scale image hiding”, Computer Vision and Image
Understanding, ELSEVIER, Vol. 107, No. 3, pp. 183-
194,2007.
[12] Bailey, K., and Curran, K., “An Evaluation of
Image Based Steganography Methods”, Journal of
Multimedia Tools
and Applications, Vol. 30, No. 1, pp. 55-88, 2006.
[13] Adnan Gutub, Ayed Al-Qahtani, Abdulaziz
Tabakh, “Triple-A: Secure RGB Image Steganography
Based on
Randomization”, International Conference on
Computer Systems and Applications (AICCSA-2009),
pp: 400-403,
10-13 May 2009.
[14] R.Amirtharajan, Sandeep Kumar Behera,
Motamarri Abhilash Swarup, Mohamed Ashfaaq and
John Bosco
Balaguru Rayappan , “Colour Guided Colour Image
Steganography” Universal Journal of Computer
Science and
Engineering Technology , 16-23, Oct. 2010, pp. 2219-
2158.
[15] Anil Kumar , Rohini Sharma,”A Secure Image
Steganography Based on RSA Algorithm and Hash-
LSB Technique
“,International Journal of Advanced Research in
Computer Science and Software Engineering, Volume
3, Issue 7,
July 2013.
[16] Gutub, A., Al-Qahtani, A., and Tabakh, A.,
“Triple-A: Secure RGB image steganography based on
randomization”, Computer Systems and Applications,
AICCSA 2009, IEEE/ACS, pp. 400 – 403, 2009..
[17] Dr. Fadhil Salman Abed “A Proposed Method of
Information Hiding Based on Hybrid Cryptography
and
Steganography “, IJAIEM, Volume 2, Issue 4, April
2013

Anda mungkin juga menyukai