Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Technical Review on Comparison and Estimation of Steganographic Tools


Affiliations
1 BMIIT, India
     

   Subscribe/Renew Journal


Steganography is technique of hiding a data under cover media using different steganography tools. Image steganography is hiding of data (Text/Image/Audio/Video) under a cover as Image. This review paper presents classification of image steganography and the comparison of various Image steganography tools using different image formats. Analyzing numerous tools on the basis of Image features and extracting the best one. Some of the tools available in the market were selected based on the frequent use; these tools were tested using the same input on all of them. Specific text was embedded within all host images for each of the six Steganography tools selected. The results of the experiment reveal that all the six tools were relatively performing at the same level, though some software performs better than others through efficiency. And it was based on the image features like size, dimensions, and pixel value and histogram differentiation.

Keywords

Information Security, Carrier, Domain, Privacy, Secret Text, Information Hiding, Cryptography, Steganography, Steganography Tools.
Subscription Login to verify subscription
User
Notifications
Font Size


  • A Kaur, R Kumar, K Kainth, “Review Paper on Image Steganography,”International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X,Vol 6, No.6, pp. 499- 502, June 2016.
  • A Kaur, R Kaur, N Kumar, “A Review on Image Steganography Techniques,” International Journal of Computer Applications, ISSN: 0975-8887, Vol 123, No.4, pp. 20-24, August 2015.
  • Yadav K,J Kaur, “Conceal and Secure Communication System,” International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X,Vol 6, No 6, June 2016. pp-802-806.
  • M Dagadita, E Slusanschi, R Dobre, "Data Hiding Using Steganography,” IEEE 12th International Symposium in Parallel and Distributed Computing, pp. 159-166, 2013.
  • G. Prabakaran, R.Bhavani, "A modified secure digital image steganography based on Discrete Wavelet Transform", IEEE International Conference in Computing, Electronics and Electrical Technologies (ICCEET), pp. 1096-1100, 2012.
  • D.R. Denslin Brabin, Dr. V. Sadasivam, “QET Based Steganography Technique for JPEG Images”, IEEE International Conference on Control, Automation, Communication and Energy Conservation, ISBN 978-1-4244-4789-3, 2009.
  • Ismail Karadogan, Resul Das,” An Examination on Information Hiding Tools for Steganography”, International Journal Of Information Security Science, Vol. 3, No.3.
  • Hamad A. Al-Korbi1, Ali Al-Ataby2 et.al, “Highly Efficient Image Steganography Using Haar Dwt For Hiding Miscellaneous Data”, Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 2, No. 1, April 2016.
  • Monika and Er. Mohinder Singh, “A survey on image based steganography framework to enhance quality of payload object”, International Journal of Engineering Research and General Science,VOL 4, No. 2, March- April, 2016.
  • L.Baby Victoria*, Dr.S.Sathappan, “A Study on Spatial Domain and Transform Domain Steganography Techniques used in Image Hiding”, International Journal Of Innovative Technology And Creative Engineering, Issn: 2045-8711, Vol.5, No.5, May 2015.
  • Don Caeiro1, Sanjana S2, “Detection of Steganography using Metadata in Jpeg Files”, The International Journal of Forensic Computer Science– IJoFCS, VOL 1, pp. 23-28,2015.
  • D.Venkata Ramana, P.Nageswara Rao, “Steganography Algorithms for Image Security Using LSB Substitution Method”, International Journal of Modern Embedded System (IJMES), Vol 4, No. 1, February, 2016.
  • Arnold, M. K., Schmucker, M., & Wolthusen, S.D,“Techniques and Applications of Digital Watermarking and Content Protection”, Artech House, Norwood, Massachusetts, 2013.
  • Joachim, J., Eggers, J. & Bernd, G. Robustness of a blind image watermarking scheme. ICIP 2000, Special Session on WM, pp. 10-13.Sep 2000.
  • Stefan, W., Elisa, D. & Gelasca, T. “Perceptual quality assessment for video watermarking,” Proceedings of International Conference on Information Technology: Coding and Computing (ITCC). April 8-10.
  • Wu, N,“A Study on Data Hiding for Gray-Level and Binary Images. Master Thesis". Chaoyang University of Technology, Taiwan, 2014.
  • Mehdi H. and Mureed H., “A survey on Image steganography Techniques”, International Journal of Advance Science and Technology, Vol. 54, May 2013.
  • Sakshi J., N. Kaur, “Digital Image Steganography Survey And Analysis Of Current Methods”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol.6, No3, May-June 2016.
  • T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3, “An Overview Of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science.
  • Islam, S., Modi, M.R. & Gupta, P.,”Edge-based image steganography”, EURASIP Journal on Information Security,Vol 8, Dec 2014.
  • Taras Holotyak1, Jessica Fridrich1 , Sviatoslav Voloshynovskiy2, “Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics”, Department of Electrical and Computer Engineering, State University of New York at Binghamton, 13902-6000.
  • Natarajan Meghanathan and Lopamudra Nayak, “Steganalysis Algorithms For Detecting The Hidden Information In Image, Audio And Video Cover Media”, International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010.
  • Suhad Shakir Jaber, Hilal Adnan Fadhil, Zahereel I. Abdul Khalib, Rasim Azeez Kadhim, ”Survey On Recent Digital Image Steganography Techniques ”, Journal of Theoretical and Applied Information Technology . Vol. 66, No.3, 31st August 2014.
  • Rajesh T. and Gadadhar Sahoo, “Some New Methodologies for Image Hiding using Steganographic Techniques”.
  • Tejashree S., U. Chaudhari, R. Bodke, “Image Steganalysis Based on Statistical Evidance by Using SVM”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, No. 2, February 2014.
  • Huan D., Zhipin D. Kebin Jia, “A Fast Macroblock Mode Decision Algorithm for MVC Based on SVM”, Dept. of Electronic Information & Control Engineering, Beijing University of Technology, Beijing, Chin.
  • Sunny D., “Highly randomized image steganography using secret keys”, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE) , pp. 1-5, 2014.
  • Darabkh, I.F. Jafar et.al., “An improved image least significant bit replacement method”, IEEE 37th International Convention in Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp 1182-1186, 2014.
  • Mohamed A., Hatem M. Abdullkader et.al, "A Steganographic Method Based on DCT and New Quantization Technique",International Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014.
  • Mohamed A, Hatem M. Abdullkade et.al.,"A Steganographic Method Based on DCT and New Quantization Technique". International Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014.
  • Reddy, H. S. M., & Raja, K. B, “High capacity and security steganography using discrete wavelet transform,”International Journal of Computer Science and Security (IJCSS), VOL. 3, No. 6, pp. 462-472. 2006.
  • Amrita K., J K Mandal. "A Genetic Algorithm based Steganography using Discrete Cosine Transformation (GASDCT)",Procardia Technology, pp. 105-111.
  • https://www.youtube.com/watch?v=7KSn_nekots
  • https://www.slideshare.net/IJMER/en2646344638
  • http://in.mathworks.com/help/images/ref/imshowpair.html
  • https://www.slideshare.net/PrimaLCarnagE/dct-steg-o-group-1
  • http://shodhganga.inflibnet.ac.in/bitstream/10603/8912/13/11_chapter%202.pdf
  • http://www.codeforge.com/s/1/Image-steganography-using-DCT-algorithm-in-MATLAB
  • http://en.pudn.com/downloads74/sourcecode/crypt/ca/detail267155_en.html
  • http://read.pudn.com/downloads74/sourcecode/crypt/ca/267155/Steganography/
  • http://en.pudn.com/downloads74/sourcecode/crypt/ca/detail267155_en.html
  • https://in.mathworks.com/help/images/image-quality.html
  • http://softasm.com/matlab-r2016-crack-full-windows-mac/
  • https://www.searchenginejournal.com/7-similarity-based-image-search-engines/8265/
  • https://www.searchenginejournal.com/google-neven-vision-image-recognition/3728/
  • http://www.garykessler.net/library/ndaa_stego.html
  • http://ws2.binghamton.edu/fridrich/Research/f5.pdf
  • https://www.slideshare.net/WXavierP/computer-forensics-and-steganography
  • http://resources.infosecinstitute.com/steganography-and-tools-to-perform-steganography/
  • https://en.wikipedia.org/wiki/Steganography

Abstract Views: 432

PDF Views: 2




  • A Technical Review on Comparison and Estimation of Steganographic Tools

Abstract Views: 432  |  PDF Views: 2

Authors

Preeti P. Bhatt
BMIIT, India
Rakesh R. Savant
BMIIT, India

Abstract


Steganography is technique of hiding a data under cover media using different steganography tools. Image steganography is hiding of data (Text/Image/Audio/Video) under a cover as Image. This review paper presents classification of image steganography and the comparison of various Image steganography tools using different image formats. Analyzing numerous tools on the basis of Image features and extracting the best one. Some of the tools available in the market were selected based on the frequent use; these tools were tested using the same input on all of them. Specific text was embedded within all host images for each of the six Steganography tools selected. The results of the experiment reveal that all the six tools were relatively performing at the same level, though some software performs better than others through efficiency. And it was based on the image features like size, dimensions, and pixel value and histogram differentiation.

Keywords


Information Security, Carrier, Domain, Privacy, Secret Text, Information Hiding, Cryptography, Steganography, Steganography Tools.

References