Comparative Review on Feature-content Based of Public Key Steganography Trends

  • Authors

    • Nor Hafizah Abdul-Razak
    • Roshidi Din
    • Mazida Ahmad
    2018-04-06
    https://doi.org/10.14419/ijet.v7i2.14.11163
  • Domain Aspect, Evaluation Parameter Aspect, Review Criteria, Scheme Aspect
  •  This paper intends to provide an up-to-date review on studies conducted in the field of Public Key Steganography (PKS). It is based on feature-content of PKS which are domain, scheme, and evaluation parameter aspects. It is concentrate on type of domain in PKS; schemes applied in PKS, and commonly used evaluation parameters in evaluating the performance of PKS system. Findings of this study are grouped into several subsections based on type of domain, schemes, and evaluation parameters. This review provides brief information related to important component in PKS environments. It provides an added value to the knowledge of PKS and also as a source of information to other researchers in conducting their study in the field of PKS. Besides, this study also provides a recommendation and good practices drawn from the reviewed literatures.

     

     
  • References

    1. [1] P. Kumar and V. K. Sharma, “Information Security Based on Steganography & Cryptography Techniques : A Review,†Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 10, pp. 246–250, 2014.

      [2] Rakhi and S. Gawande, “A Review on Steganography Methods,†Int. J. Adv. Res. Electr. Electron. Instrum. Eng., vol. 2, no. 10, pp. 4635–4638, 2013.

      [3] Z. K. Al-ani, A. A. Zaidan, B. B. Zaidan, and H. O. Alanazi, “Overview : Main Fundamentals for Steganography,†J. Comput., vol. 2, no. 3, pp. 158–165, 2010.

      [4] B. Zachariah, P. N. Yabuwat, and E. Bernard, “Application of Steganography and Cryptography for Secured Data Communication – A Review,†Int. J. Eng. Res. Technol., vol. 5, no. 4, pp. 186–190, 2016

      [5] J. Kour and D. Verma, “Steganography Techniques –A Review Paper,†Int. J. Emerg. Res. Manag. &Technology, vol. 9359, no. 35, pp. 2278–9359, 2014.

      [6] S. M. Thampi, “Information Hiding Techniques : A Tutorial Review,†ISTE-STTP Netw. Secur. Cryptogr. LBSCE, 2004.

      [7] M. Shirali-Shahreza, “Steganography in MMS,†in 11th IEEE International Multitopic Conference, 2007, pp. 5–8.

      [8] A. Sharma and N. Jain, “Steganography & Cryptography for Regimented Data Hiding System : A Review,†Int. J. Sci. Res., vol. 4, no. 4, pp. 3119–3124, 2015.

      [9] H. S and Dhamodharan R, “A Survey on DNA Based Cryptography using Differential Encryption and Decryption Algorithm,†IOSR J. Electron. Commun. Eng. Ver. II, vol. 10, no. 5, pp. 2278–2834, 2015.

      [10] P. P. Palsaniya and P. D. Soni, “CryptoSteganography : Security Enhancement by using Efficient Data Hiding Techniques,†Int. J. Appl. or Innov. Eng. Manag., vol. 3, no. 2, pp. 263–267, 2014.

      [11] R. Böhme, “Principles of Modern Steganography and Steganalysis,†in Advanced Statistical Steganalysis, Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 11–77.

      [12] R. Maini, “A Comparitive Analysis of Steganography Techniques,†pp. 67–70, 2016.

      [13] R. Amirtharajan and J. B. B. Rayappan, “Steganography-time to time: A review,†Res. J. Inf. Technol., vol. 5, no. 2, pp. 53–66, 2013.

      [14] E. Zielińska, W. Mazurczyk, and K. Szczypiorski, “Development Trends in steganography,†Commun. ACM, vol. 57, no. 3, pp. 86–95, 2014.

      [15] N. Kaur and S. Behal, “A Survey on various types of Steganography and Analysis of Hiding Techniques,†Int. J. Eng. Trends Technol., vol. 11, no. 8, pp. 388–392, 2014.

      [16] M. M. Sadek, A. S. Khalifa, and M. G. M. Mostafa, “Video Steganography: A Comprehensive Review,†Multimed. Tools Appl., vol. 74, no. 17, pp. 7063–7094, 2015.

      [17] F. Djebbar, B. Ayad, K. A. Meraim, and H. Hamam, “Comparative study of digital audio steganography techniques,†EURASIP J. Audio, Speech, Music Process., vol. 2012, no. 1, pp. 1–16, 2012.

      [18] B. Zachariah, P. N. Yabuwat, and E. Bernard, “Application of Steganography and Cryptography for Secured Data Communication – A Review,†Int. J. Eng. Res. Technol., vol. 5, no. 4, pp. 186–190, 2016.

      [19] P. R. Kamble, P. S. Waghamode, V. S. Gaikwad, and M. G. B. Hogade, “Steganography Techniques: A Review,†Int. J. Eng. Res. Technol., vol. 2, no. 10, pp. 3784–3793, 2013.

      [20] H. Singh, P. Singh, and K. Saroha, “A Survey on Text Based Steganography,†Proceedings of the 3rd National Conference; INDIA Com-2009 Computing For Nation Development. pp. 1–3, 2009.

      [21] S. Kingslin and N. Kavitha, “Evaluative Approach towards Text Steganographic Techniques,†Indian J. Sci. Technol., vol. 8, no. November, pp. 1–8, 2015.

      [22] D. Salomon, “Data Hiding in Text,†in Data Privacy and Security, New York, NY: Springer New York, 2003, pp. 245–267.

      [23] D. Grībermans, A. Jeršovs, and P. Rusakovs, “Development of Requirements Specification for Steganographic Systems,†Appl. Comput. Syst., vol. 20, no. 1, pp. 40–48, 2016

  • Downloads

  • How to Cite

    Hafizah Abdul-Razak, N., Din, R., & Ahmad, M. (2018). Comparative Review on Feature-content Based of Public Key Steganography Trends. International Journal of Engineering & Technology, 7(2.14), 89-92. https://doi.org/10.14419/ijet.v7i2.14.11163