Understandable Steganography

  • Authors

    • Indu Maurya BIET JHANSI
    • S K Gupta BIET JHANSI
    2018-06-23
    https://doi.org/10.14419/ijet.v7i3.8940
  • Digital Image, Steganography, Domains, Spatial and Frequency, Information Security, Information Hiding.
  • For hiding information in a digitalized object Steganography is an important technique. It is a special kind of scientific technique which involves the secret information communication inside suitable cover objects of multimedia like image files, audio or videos. The embedded data and its existence are hidden with the help of Steganography. It is a method of hiding data which has enormously improved the security level of confidential data with the help of special hiding mechanism and is considered as remarkable achievement in the computational power. The main aims of Steganography are; capacity of concealed data along with its robustness, lack of detection etc. These are some of the additional features which make it distinguishing from other older techniques like watermarking as well as cryptography. In this research paper, we have surveyed Steganography of digital images and cover the basic and key concepts. In spatial representation the development of image Steganographic methodology in the format of JPEG, along with that we will also debate on the modern developments as far as Steganography is concerned.

    For increasing Steganographic security, specifically used approaches are shortlisted and the developments made after investigations are also presented in this paper.

     

     

  • References

    1. [1] Hniels Provos & Peter Honeyman,â€Hide & Seek: An Introduction to Steganography†IEEE Computer Society Pub-2003.

      [2] Ge Huayong, Huang,â€Steganography and Steganalysis Based on Digital Imageâ€, International conference & signal Processing-2011IEEE.

      [3] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2) (1998) 26-34.https://doi.org/10.1109/MC.1998.4655281.

      [4] J.C. Judge, Steganography: Past, present, future. SANS Institute publication, http://www.sans.org/reading_room/whitepapers/stengano graphy/552.php, 2001.

      [5] W Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,†IBM Systems Journal, Vol. 35, No. 3 and 4, pp.313-336, 1996.

      [6] M. Swanson, M. Kobayashi, and A. Tewfik, “Multimedia data embedding and watermarking technologies,†Proceedings of the IEEE, Vol. 86, No. 6, pp. 1064-1087, June 1998. https://doi.org/10.1109/5.687830.

      [7] R. Wolfgang, C. Podilchuk and E. Delp, “Perceptual watermarks for images and video,†to appear in the Proceedings of the IEEE, May, 1999. (A copy of this paper is available at: http://www.ece.purdue.edu/~ace).

      [8] N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,†IEEE Computer, pp. 26-34, February 1998.

      [9] R. B. Wolfgang and E. J. Delp, “Fragile watermarking using the VW2D watermark,†Proceedings of the SPIE/IS&T Conference on Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, San Jose, CA, January 1999.

      [10] J. Floresâ€Escalante, J. Pérezâ€Díaz and R. Gómezâ€Cárdenas, Design and Implementation of An Electronic Identification Card, Journal Of Applied Research And Technology.

      [11] Aravind K. Mikkilineni, Osman Arslan , Pei-Ju Chiang, Roy M. Kumontoy, Jan P. Allebach,George T.-C.Chiu, Edward J. Delp, Printer Forensics using SVM Techniques , This research was supported by a grant from the National Science Foundation, under Award Number 0219893.

      [12] M. Wu, E. Tang, and B. Lin, Data hiding in digital binary image, Proc. of 2000 IEEE International Conference on Multimedia and Expo,vol. 1, pp. 393-396, 2000.

      [13] G. Liang, S. Wang, and X. Zhang, Steganography in binary image by checking data-carrying eligibility of boundary pixels, Journal of Shanghai University, vol. 11, no. 3, pp. 272-277, 2007. https://doi.org/10.1007/s11741-007-0317-2.

      [14] Jessica Fridrich, Miroslav Goljan, and Rui Du, Reliable detection of lsb steganography in color and Gray scale images. Proc. of 2001 ACM workshop on Multimedia and security: new challenges, pp.27-30, ACM Press, 2001.

      [15] P. Alvarez, Using extended file information (EXIF) file headers in digital evidence analysis, International Journal of Digital Evidence, Economic Crime Institute (ECI) 2 (3) (2004) 1–5.

      [16] V. Lokeswara Reddy, Dr.A.Subramanyam, Dr.P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formatsâ€, Int. J. Advanced Networking and Applications 868 Volume: 02, Issue: 05, Pages: 868-872 (2011).

      [17] Morkel, T., Eloff, J.H.P., Olivier, M.S.: An Overview of Image Steganography. University of Pretoria, South Africa (2002).

      [18] Wang, H., Wang, S: Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM 47(10) (2004). https://doi.org/10.1145/1022594.1022597.

      [19] T. Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceeding of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sand to South Africa, June/July 2005.

      [20] Eiji Kawaguchi and Richard O. Eason, Principle and applications of bpcs steganography, In Multi-media Systems and Applications, vol. 3528, pp. 464-473, SPIE, 1998.

      [21] T. Sharp, An implementation of key-based digital signal steganography, Proc. of the 4th Information Hiding Workshop, vol. 2137, pp. 13-26, Springer, 2001. https://doi.org/10.1007/3-540-45496-9_2.

      [22] J. Mielikainen,Lsb matching revisited, IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.https://doi.org/10.1109/LSP.2006.870357.

      [23] X. Li, B. Yang, D. Cheng, and T. Zeng, A generalization of lsb matching, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009. https://doi.org/10.1109/LSP.2008.2008947.

      [24] J. Fridrich, D. Soukal, and M. Goljan, Maximum likelihood estimation of secret message length embedded using pmk steganography in spatial domain, Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 595-606, 2005.

      [25] J. Fridrich and M. Goljan, Digital image steganography using stochastic modulation, Proc. Of IST/SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents V, vol. 5020, pp. 191-202, 2003. https://doi.org/10.1117/12.479739.

      [26] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value diRerencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6.

      [27] B. Chen and G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001. https://doi.org/10.1109/18.923725.

      [28] H. Noda, M. Niimi, and E. Kawaguchi, High- performance jpeg steganography using quantization index modulation in dct domain, Pattern Recognition Letters, vol. 27, no. 5, pp. 455-461, 2006. https://doi.org/10.1016/j.patrec.2005.09.008.

      [29] J.J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1003-1019, 2003.https://doi.org/10.1109/TSP.2003.809366.

      [30] A.C. Popescu, Statistical tools for digital image forensics, Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, 2005. Available from: http://www.cs.dartmouth.edu/~farid/publications/apthesis 05.htmlS, on 16-05-07 at 12:20.

      [31] X. Li, J. Wang, A steganographic method based upon JPEG and particle swarm optimization algorithm, Information Sciences 177 (15) (2007) 3099–31091. https://doi.org/10.1016/j.ins.2007.02.008.

      [32] A.M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in: Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April 2006, pp. 1–6. https://doi.org/10.1109/ICEIS.2006.1703168.

      [33] A.I. Hashad, A.S. Madani, A.E.M.A. Wahdan, A robust steganography technique using discrete cosine transform insertion, in: Proceedings of IEEE/ITI Third International Conference on Information and Communications Technology, Enabling Technologies for the New Knowledge Society, 5–6 December 2005, pp. 255–264.

      [34] N. Provos, P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security and Privacy 1 (3) (2003) 32–44. https://doi.org/10.1109/MSECP.2003.1203220.

      [35] P. Wayner, Disappearing Cryptography, second ed, Morgan Kaufmann Publishers, 2002.

      [36] C. Manikopoulos, S. Yun-Qing, S. Sui, Z. Zheng, N. Zhicheng, Z. Dekun, Detection of block DCT-based steganography in gray-scale images, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9–11 December 2002, pp. 355–358.

      [37] Derek Upham, Jsteg, http://zooid.org/ paul/crypto/jsteg/.

      [38] Allan Latham, Jphide, http://linux01.gwdg.de/ alatham/stego.html.

      [39] A. Westfeld, F5-A steganographic algorithm: high capacity despite better steganalysis, in: Proceedings of Fourth International Work-shop on Information Hiding, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, USA, April 2001, pp. 289–302. https://doi.org/10.1007/3-540-45496-9_21.

      [40] A. Westfeld and A. Pfitzmann, Attacks on steganographic systems-breaking the steganographic utilities ezstego, JSteg, steganos, and s-tools-and some lessons learned. Proc. Of the 3rd Information Hiding Workshop, vol.1768, pp. 61-76, Springer, 1999. https://doi.org/10.1007/10719724_5.

      [41] J. Fridrich, T. Pevny, J. Kodovsky Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities, in: Proceedings of the ACM Ninth Workshop on Multimedia & Security, Dallas, Texas, USA, September 20–21, 2007, pp. 3–14.

      [42] J. Fridrich, M. Goljan, D. Hogeg, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of Information Hiding: Fifth International Workshop, IH 2002 Noordwijkerhout, The Netherlands, Lecture Notes in Computer Science, Springer, October 7–9, 2002, 2578/2003, pp. 310–323.

      [43] N. Provos, P. Honeyman, Detecting steganographic content on the Internet, Centre for Information Technology Integration, University of Michigan, Technical report, August 31, 2001.

      [44] N. Provos, Defending against statistical steganalysis, Centre for Information Technology Integration, University of Michigan, Technical report, February 2001.

      [45] K. Solanki, A. Sarkar, and B. S. Manjunath, Yass: Yet another steganographic scheme that resists blind steganalysis, Proc. of the 9th Information Hiding Workshop, Springer, vol. 4567, pp. 16-31, 2007.https://doi.org/10.1007/978-3-540-77370-2_2.

      [46] J. Fridrich, Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes, Proc. of the 6th Information Hiding Workshop, Springer, vol. 3200 , pp. 67-81, 2004. https://doi.org/10.1007/978-3-540-30114-1_6.

      [47] Tomas Pevny and Jessica Fridrich, Merging markov and dct features for multi-class jpeg steganalysis. Proc. of SPIE: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 3-14, 2007. https://doi.org/10.1117/12.696774.

      [48] Lifang Yu, Yao Zhao, Rongrong Ni, and Yun Q. Shi, A high-performance yass-like scheme using randomized big-blocks, Proc. of the IEEE International Conference on Multimedia and Expo (ICME 2010), 2010.

      [49] Fangjun Huang, Jiwu Huang, and Yun Qing Shi, An experimental study on the security performance of YASS, IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 374-380, 2010. https://doi.org/10.1109/TIFS.2010.2054082.

      [50] W.Y. Chen, Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation, Applied Mathematics and Computation 185 (1) (2007) 432–448. https://doi.org/10.1016/j.amc.2006.07.041.

      [51] V.M. Potdar, S. Han, E. Chang, A survey of digital image water-marking techniques, in: Proceedings of the IEEE Third International Conference on Industrial Informatics (INDIN), Perth, Australia, 10–12 August 2005, pp. 709–716.

      [52] B. Verma, S. Jain, D.P. Agarwal, Watermarking image databases: a review, in: Proceedings of the International Conference on Cogni-tion and Recognition, Mandya, Karnataka, India, 22–23 December 2005, pp. 171–179.

      [53] N.K. Abdulaziz, K.K. Pang, Robust data hiding for images, in: Proceedings of IEEE International Conference on Communication Technology, WCC- ICCT’02, vol. 1, 21–25 August 2000, pp. 380–383. https://doi.org/10.1109/ICCT.2000.889233.

      [54] A.A. Abdelwahab, L.A. Hassan, A discrete wavelet transform based technique for image data hiding, in: Proceedings of 25th National Radio Science Conference, NRSC 2008, Egypt, March 18–20, 2008, pp. 1–9.https://doi.org/10.1109/NRSC.2008.4542319.

      [55] A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar, A novel technique for image steganographybased on DWT and Huffman coding, IJCSS, vol. 4, no. 6, pp. 561-570.

      [56] P. Sallee, Model-based steganography, Proc. of the 2nd International Workshop on Digital Water-marking, vol. 2939, pp. 154-167, Springer, 2003.

      [57] M. Kharrazi, H.T. Sencar, N. Memon, Performance study of common image steganography and steganalysis techniques, Journal of Electrical Imaging 15 (4) (2006) 1–16.

      [58] R. Tzschoppe, R. Baum, J. Huber, A. Kaup, Steganographic system based on higher-order statistics, in: Proceedings of SPIE, Security and Watermarking of Multimedia Contents V. Santa Clara, California, USA 2003, vol. 5020, pp. 156–166. https://doi.org/10.1117/12.477301.

      [59] A. Ker, “Steganalysis of LSB Matching in Grayscale Images.†IEEE Signal Processing Letters, vol. 12(6), pp. 441–444, 2005 https://doi.org/10.1109/LSP.2005.847889.

      [60] J. Spaulding, H. Noda, M.N. Shirazi, E. Kawaguchi, BPCS steganography using EZW lossy compressed images, Pattern Recognition Letters 23 (13) (2002) 1579–1587. https://doi.org/10.1016/S0167-8655(02)00122-8.

      [61] C.C. Chang, H.W. Tseng, A steganographic method for digital images using side match, Pattern Recognition Letters 25 (12) (2004) 1431–1437. https://doi.org/10.1016/j.patrec.2004.05.006.

      [62] E. Franz, A. Schneidewind, Adaptive steganography based on dithering, in: Proceedings of the ACM Workshop on Multimedia and Security, September 20– 21, 2004, Magdeburg, Germany, pp. 56–62. https://doi.org/10.1145/1022431.1022443.

      [63] R. Bohme, A. Westfeld, Breaking cauchy model-based JPEG steganography with first order statistics, in: Proceedings of the European Symposium on Research in Computer Security, ESORICS 2004, Valbonne, France, 13th September 2004, Lecture Notes in Computer Science, vol. 3193, p p. 125–140. https://doi.org/10.1007/978-3-540-30108-0_8.

      [64] L. Yu, Y. Zhao, R. Ni, Z. Zhu, PM1 steganography in JPEG images using genetic algorithm, Soft Computing 13 (4) (2009) 393–400. https://doi.org/10.1007/s00500-008-0327-7.

      [65] C.C. Chang, P. Tsai, M.H. Lin, An adaptive steganography for index- based images using code word grouping, Advances in MultimediaInformation Processing-PCM, Springer, vol. 3333, 2004, pp. 731– 738.

      [66] Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun Adaptive data hiding in edge areas of images with spatial LSB do-main systems. IEEE Transactions on Information Forensics and Security, 2008, vol. 3, no. 3, p. 488-497. https://doi.org/10.1109/TIFS.2008.926097.

      [67] Y.H. Yu, C.C. Chang, I.C. Lin, A new steganographic method for color and grayscale image hiding, Computer Vision and Image Under-standing 107 (3) (2007) 183– 194. https://doi.org/10.1016/j.cviu.2006.11.002.

      [68] M. Drew, S. Bergner, Spatio-chromatic de-correlation for color image compression, Technical Report, School of Computing Science, Simon Fraser University, Vancouver, Canada, 2007, available from:/http:// fas.sfu.ca/pub/cs/TR/2007/CMPT2007-09.pdfS.

      [69] M. Saenz, R. Oktem, K. Egiazarian, E. Delp, Colour image wavelet compression using vector morphology, in: Proceedings of the European Signal Processing Conference, September 5–8 2000, Tampere, Finland, 2000, pp. 5–8.

      [70] D. Van Der Weken, M. Nachtegael, E. Kerre, Using similarity measuresand homogeneity for the comparison of images, Image and Vision Computing 22 (9) (2004) 695–702. https://doi.org/10.1016/j.imavis.2004.03.002.

      [71] M. Kutter, F. Petitcolas, A fair benchmark for image watermarking systems, in: Proceedings of Electronic Imaging ‘99, Security and Watermarking of Multimedia Contents, San Jose, California, USA, 25–27 January 1999, vol. 3657, pp. 226–239.

      [72] R. Crandall, Some notes on steganography, Posted on steganography mailing list, http://os.inf.tu-dresden.de/ westfeld/crandall.pdf, 1998.

      [73] J. Fridrich and D. Soukal, Matrix embedding for large payloads, IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 390-395, 2006. https://doi.org/10.1109/TIFS.2006.879281.

      [74] W. M. Zhang, X. P. Zhang, and S. Z. Wang, A double layered plus-minus one data embedding scheme, IEEE Signal Processing Letters, vol. 14, no. 11, pp. 848-851, 2007. https://doi.org/10.1109/LSP.2007.903255.

      [75] J. Fridrich, P. Lisonek, and D. Soukal, On steganographic embedding efficiency, Proc. of the 8th Information Hiding Workshop, Springer, no. 4437, pp. 282-296, 2007.

      [76] JAurgen Bierbrauer and Jessica Fridrich, Constructing good covering codes for applications in steganography, LNCS Trans. Data Hiding and Multimedia Security III, vol. 4920, pp. 1-22, 2008. https://doi.org/10.1007/978-3-540-69019-1_1.

      [77] Y. Kim, Z. Duric, and D. Richards, Modified matrix encoding for minimal distortion steganography. Proc. of the 8th Information Hiding Workshop, Springer, vol. 4437, pp. 314-327, 2006.

      [78] Jessica Fridrich, Minimizing the embedding impact in steganography, Proc. of the 8th ACM workshop on Multimedia and Security, ACM Press, pp. 2-10, 2006.

  • Downloads

  • How to Cite

    Maurya, I., & K Gupta, S. (2018). Understandable Steganography. International Journal of Engineering & Technology, 7(3), 1024-1033. https://doi.org/10.14419/ijet.v7i3.8940