Top Banner
@IJMTER-2015, All rights Reserved 527 Survey and Analysis of Current methods of Steganography Madhulina Das 1 , Samir Kumar Bandyopadhyay 2 1, 2 Department of Computer Science and Engineering, University of Calcutta, India Abstract - Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. This paper is a tutorial review of the steganography techniques appeared in the literature. Keywords: Digital image steganography; spatial domain; frequency domain; adaptive steganography; I. INTRODUCTION Steganography is an art of secret communications. Steganography means to conceal messages existence in another medium Its techniques are in use from hundreds of years. Digital Steganography is the technique of securing digitized data by hiding it into another piece of data. Today, in digital age the easy access to any form of data such as audio, videos, images and text make it vulnerable to many threats [1]. Steganography means is not to alter the structure of the secret message, but hides it inside a cover- object (carrier object). After hiding process cover object and stego-object (carrying hidden information object) are similar. Due to invisibility or hidden factor it is difficult to recover information without known procedure in steganography. Detecting procedure of steganography known as Steganalysis. Cover image Secrete image Stego image (it can be data also) Fig1: (Steganoghraphic Process) 1.1. Steganography in Digital Mediums Depending on the type of the cover object there are many suitable steganographic techniques which are followed in order to obtain security. It can be shown in Figure 1.
11

Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

Apr 18, 2018

Download

Documents

duongbao
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

@IJMTER-2015, All rights Reserved 527

Survey and Analysis of Current methods of Steganography

Madhulina Das1, Samir Kumar Bandyopadhyay2 1, 2 Department of Computer Science and Engineering, University of Calcutta, India

Abstract - Steganography is the science that involves communicating secret data in an appropriate

multimedia carrier, e.g., image audio, and video files. It comes under the assumption that if the feature is

visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the

embedded data. In comparison with Analog media, Digital media offers several distinct advantages such

as high quality, easy editing, high fidelity copying, compression etc. In order to address this Information

Security, Steganography plays an important role. Steganography is the art and science of writing hidden

messages in such a way that no one apart from the sender and intended recipient even realizes there is a

hidden message. This paper is a tutorial review of the steganography techniques appeared in the

literature.

Keywords: Digital image steganography; spatial domain; frequency domain; adaptive steganography;

I. INTRODUCTION

Steganography is an art of secret communications. Steganography means to conceal messages existence

in another medium Its techniques are in use from hundreds of years. Digital Steganography is the

technique of securing digitized data by hiding it into another piece of data. Today, in digital age the easy

access to any form of data such as audio, videos, images and text make it vulnerable to many threats [1].

Steganography means is not to alter the structure of the secret message, but hides it inside a cover-

object (carrier object). After hiding process cover object and stego-object (carrying hidden information

object) are similar. Due to invisibility or hidden factor it is difficult to recover information without

known procedure in steganography. Detecting procedure of steganography known as Steganalysis.

Cover image Secrete image Stego image

(it can be data also)

Fig1: (Steganoghraphic Process)

1.1. Steganography in Digital Mediums Depending on the type of the cover object there are many suitable steganographic techniques which are

followed in order to obtain security. It can be shown in Figure 1.

Page 2: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 528

I.1.1. Image Steganography: Taking the cover object as image in steganography is known as image

steganography. Generally, in this technique pixel intensities are used to hide the information.

1.1.2. Network Steganography: When taking cover object as network protocol, such as TCP, UDP,

ICMP, IP etc, where protocol is used as carrier, is known as network protocol steganography. In the OSI

network layer model there exist covert channels where steganography can be achieved in unused header

bits of TCP/IP fields [2].

1.1.3. Video Steganography: Video Steganography is a technique to hide any kind of files or

information into digital video format. Video (combination of pictures) is used as carrier for hidden

information. Generally discrete cosine transform (DCT) alter values (e.g., 8.667 to 9) which is used to

hide the information in each of the images in the video, which is not noticeable by the human eye. Video

steganography uses such as H.264, Mp4, MPEG, AVI or other video formats.

1.1.4. Audio Steganography: When taking audio as a carrier for information hiding it is called audio

steganography. It has become very significant medium due to voice over IP (VOIP) popularity. Audio

steganography uses digital audio formats such as WAVE, MIDI, AVI MPEG or etc for steganography.

1.1.5. Text Steganography: General technique in text steganography, such as number of tabs, white

spaces, capital letters, just like Morse code [3] and etc is used to achieve information hiding.

II. OBJECTIVE OF STEGANOGRAPHY

The main goal of steganography is to communicate securely in a completely undetectable manner [4]

such that no one can suspect that it exist some secret information.

The data can be copied for purpose of copyright violation, tampered with or illegally accessed without

the knowledge of owner. Therefore, the need of hiding secret identification inside different types of

digital data is required such that owner can prove copyright ownership;

enhancing robustness of image search engines and smart IDs (identity cards) where individuals’ details

are embedded in their photographs.

Other objective are video-audio synchronization, companies’ safe circulation of secret data, TV

broadcasting, TCP/IP packets (for instance a unique ID can be embedded into an image to analyze the

network traffic of particular users) [3], and also checksum embedding [11].

III. HISTORY OF STEGANOGRAPHY

The standard and concept of “What You See Is What You Get (WYSIWYG)” which we encounter

sometimes while printing images or other materials, is no longer precise and would not fool a

steganographer as it does not always hold true. A thorough history of steganography can be found in the

literature [3,5 , 6]. The word steganography is originally derived from Greek words which mean

“Covered Writing”. It has been used in various forms for thousands of years. In the 5th century BC

Histaiacus shaved a slave’s head, tattooed a message on his skull and the slave was dispatched with the

message after his hair grew back [3, 5, 6, 7]. In the recent history with the boost in computer power, the

internet and with the development of digital signal processing (DSP), information theory and coding

theory, steganography has gone “digital”. One of the earliest methods to discuss digital steganography is

credited to Kurak and McHugh [8], who proposed a method which resembles embedding into the 4

LSBs (least significant bits). They examined image downgrading and contamination which is known

now as image-based steganography. Embedding hidden messages in video and audio files is also

possible. Examples exist in [9] for hiding data in music files, and even in a simpler form such as in

Hyper Text Mark up Language (HTML), executable files (.EXE) and Extensible Markup Language

(XML) [10].

Page 3: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 529

IV. Methods of steganography

Steganography methods can be classified into six categories.

4.1 Substitution

A general frame work showing the substitution method is highlighted in fig 2.

Fig 2: Steganography by substitution

Jung and Yoo [12] down-sampled an input image to ½ of its size and then used a modified interpolation

method, termed the neighbour mean interpolation (NMI), to up-sample the result back to its original

dimensions

ready for embedding. For the embedding process the up-sampled image was divided into 2x2 non-

overlapping blocks as shown in Fig. 3. Potential problems with this method are:

the impossibility of recovering the secret bits without errors, owing to the use of log2, which is

also used in the extraction that produces floating point values, and

since in the 2x2 blocks, the leading value (i.e., block(1,1)) is left unaltered, thus this would lead

to the destruction of the natural strong correlation between adjacent pixels which would advertise a non-

natural process involvement.

Page 4: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 530

Fig 3: The system reported in Jung and Yoo [12].

Chi-Kwong Chan and L.M. Cheng [13] proposed a data hiding scheme by simple LSB substitution by

applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB

substitution method, the image quality of the stego-image can be greatly improved with low extra

computational complexity. The worst case mean-square-error between the stego-image and the cover-

image is derived. Experimental results show that the stego-image is visually indistinguishable from the

original cover-image.

Vijay Kumar Sharma ,Vishal Shrivastava [14] proposed another substitution method. The proposed

algorithm embedded MSB of secret image in to LSB of cover image. in this n LSB of cover image ,from

a byte is replaced by n MSB of secret image. the image quality of the stego-image can be greatly

improved with low extra computational complexity. The worst case mean-square-error between the

stego-image and the cover-image is derived. Experimental results show that the stego-image is visually

indistinguishable from the original cover-image when n<=4, because of better PSNR which is achieved

by this technique.

(Chang et al., 2002) [15] (Thien et al., 2003) [16] proposes that LSB substitution is the most commonly

used method directly replacing the LSBs of pixels in the cover image with secret bits to get the stego-

image. LSB substitution algorithm is the simplest scheme to hide message in a host image. It replaces

the least significant bit (LSB) of each pixel with the encrypted message bit stream. Authenticated

receivers can extract the message by deciphering the LSB of every pixel of the host image with a pre-

shared key. Since only the least significant bit of pixels is altered, it is visually imperceptible by human.

The capacity of the algorithm is 1 bit per pixel.

Samir Kumar Bandyopadhyay et.al [17] proposed a genetic algorithm. Using the proposed Genetic

Algorithm, message bits are embedded into different bits of the pixel grey level values, resulting in

increased robustness. The robustness would be increased against those attacks which try to reveal the

hidden message and also some unintentional attacks like noise addition as well. Proposed a Genetic

Algorithm approach to make the bit insertion technique more robust by inserting message bits in

Page 5: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 531

different bit level of the pixel grey level values. The layers are selected in pseudo – random method

thereby making it more robust against steganolytic attack. The

proposed Genetic approach minimises the effect of bit updation on image grey value thereby reducing

the risk the statistical stego attack. Moreover only the stego image is sent to the reciever end thereby

reducing chances of suspicion.

4.2 Transform Domain

Basically there are many kinds of power level transforms that exist to transfer an image to its

frequency domain, some of which are Discrete Cosine Transform, KL Transform and Wavelet

Transform.

Gurmeet Kaur and Aarti Kochhar [18] have compare the DCT and DWT method. This paper presents

a novel technique for Image steganography based on DWT, where DWT is used to transform original

image (cover image) from spatial domain to frequency domain. The experimental results show that the

algorithm has a high capacity and a good invisibility as compare to DCT. Moreover PSNR of cover

image with stego-image shows the better results in comparison with existing Steganography approaches.

DCT The description of the two-dimensional DCT for an input image F and an output image T is

calculated as:

T(pq)=𝛼(𝑝)𝛼(𝑞) 𝐹(𝑚𝑛) cos𝜋(2𝑛+1)𝑞

2𝑀𝑁−1𝑛=0

𝑀−1𝑚=0 cos

𝜋(2𝑛+1)𝑞

2𝑁

where,

0≤ q≤ N -1

0 ≤p≤ M- 1

𝛼(p)=

1

𝑀, 𝑝 = 0

2

𝑀, 1 ≤ 𝑝 ≤ 𝑀 − 1

𝛼(𝑞) =

1

𝑁, 𝑞 = 0

2/𝑁, 1 ≤ 𝑞 ≤ 𝑁 − 1

where M, N are the dimensions of the input image while m, n are variables ranging from 0 to M-1 and 0

to N-1 respectively.

DCT is used extensively with video and image compression e.g. JPEG lossy compression. Each block

DCT coefficients obtained from Eq. (3) are quantized using a specific Quantization Table (QT).

DWT

Figure 4 describes the typical scenario when using DWT. The image to which DWT is applied gets split

up into 4 regions LL, LH, HL, and HH respectively. Of these regions LL region holds the visually more

significant data whereas HH region holds the visually less significant data. On application of DWT to

the carrier image, the high frequency components get separated from low frequency components which

help us to achieve a convenient space to embed our message into it.

Figure 4 Scenario using DWT

The embedding capacity can be further improved by applying the second level of DWT to LL region

which is generated after applying DWT to the entire carrier image. This generates four more regions,

namely the LL1, LH1, HL1, and HH1 regions. Of these regions, the LL1 region now contains visually

Page 6: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 532

the most significant details whereas LH1, HL1, HH1 are still acceptable to be replaced. Hence we have

successfully tried replacing these regions and the distortion in the carrier image is very low, typically not

observable to human eye unless magnified using computing techniques.

Figure 5 Second Level DWT

Hemalatha S et.al [19] provides a novel image steganography technique to hideboth image and key in

color cover image using Discrete Wavelet Transform (DWT) and Integer WaveletTransform (IWT).

There is no visual difference between the stego image and the cover image. The extractedimage is also

similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio),value for both

stego and extracted secret image. The results are compared with the results of similartechniques and it is

found that the proposed technique is simple and gives better PSNR values than others.

In Prosanta Gope et. al.’s article [20], the authors introduce an enhanced JPEG steganography along

with a suitable encryption methodology using a symmetric key cryptographic algorithm.The JPEG cover

image is broken into 8 x 8 blocks of pixel. DCT is applied to each block andquantization is done and

data is encrypted using a new encryption method which uses CRC checking.

In S.Arivazhagan et. al.’s work [21] the authors propose a method that works in the transform domain

and attempts to extract the secret almost as same as the embedded one, maintaining minimal changes to

cover image by using techniques like median maintenance, offset & quantization. A modified approach

for embedding colour images within colour images is proposed and it overcomes the limitations in

embedding. Arnold Transform is applied on the secret image to increase robustness. This transformed

image is then split into the three colour. planes R, G, B and are subjected to DWT individually,

converted to bit stream and then

concatenated to be embedded in the cover image which is also subjected to DWT.

4.3 Spread Spectrum

Spread spectrum communication describes the process of spreading the bandwidth of a narrowband

signal across a wide band of frequencies. This can be accomplished by modulating the narrowband

waveform with a wideband waveform, such as white noise. After spreading, the energy of the

narrowband signal in any one frequency band is low and therefore difficult to detect. SSIS works by

storing a message as Gaussian noise in an image. At low noise power levels, the image degradation is

undetectable by the human eye, while at higher levels the noise appears as speckles or “snow.” The

process consists of the following major steps, as illustrated in figure 6:

1. Create encoded message by adding redundancy via error-correcting code.

2. Add padding to make the encoded message the same size as the image.

3. Interleave the encoded message.

4. Generate a pseudorandom noise sequence, n.

5. Use encoded message, m using advanced encryption standard (AES) to modulate the sequence,

generating noise, s.

Page 7: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 533

6. Combine the noise with the original image, f. Recover the hidden message. A filter is used to extract

the noise from the stegoimage, resulting in an approximation of the original image. The better this filter

works the fewer errors in the extracted message.

Figure 6 Processing Steps

Tanmay Bhattacharya et.al [22] proposed a DWT based Steganographic technique. Cover image is

decomposed into four sub bands using DWT. Two secret images are embedded within the HL and HH

sub bands respectively. During embedding secret images are dispersed within each band using a pseudo

random sequence and a Session key. Secret images are extracted using the session key and the size of

the images. In this approach the stego image generated is of acceptable level of imperceptibility and

distortion compared to the cover image and the overall security is high.

4.4 Statistical

Statistical steganography techniques utilize the existence of “1bit” steganographic schemes,which

embed one bit of information in a digital carrier. This is done by modifying the cover in such a way that

some statistical characteristics change significantly if a”1” is transmitted. Otherwise the cover is left

unchanged.so the receiver must be able to distinguished unmodified covers from modified ones.

In order to construct a l(m)bit stego-system from multiple “1bit” stego system, a cover is divided into

l(m) disjoint blocks B1,…,Bl(m). A secret bit, mi,is inserted into the ith block by placing a “1” into Bi if

mi=1. Otherwise, the block is not changed in the embedding process. The detection of a specific bit is

done via a test function which distinguishes modified blocks from unmodified blocks:

𝑓(𝐵𝑖) = 1 𝑏𝑙𝑜𝑐𝑘 𝐵𝑖 𝑖𝑠 𝑚𝑜𝑑𝑖𝑓𝑒𝑑 𝑖𝑛 𝑡ℎ𝑒 𝑒𝑚𝑏𝑒𝑑𝑑𝑖𝑛𝑔 𝑝𝑟𝑜𝑐𝑒𝑠𝑠

0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒

The function f can be interpreted as a hypothesis-testing fuction; we test the null-hypothesis “block Bi

was not modified” against the alternative hypothesis “block bi was modified”. Therefore we can call the

whole class of such steganography systems Statistical Steganography. The receiver successively applies

f to all cover-blocks bi in order to restore every bit of the secrete message.

Page 8: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 534

In Chin-Chen Chang et.al.’s article [23] a new approach to wet paper codes using random linear codes

of small co-dimension is used which improves embedding efficiency is proposed. To prevent from

attack, the selection channel should not be publicly available even in any partial form. A possible

remedy is to select it according to some side information that is in principle unavailable to the attacker

(e.g.) random or that cannot be well estimated from the stego image. Steganography with non shared

selection channels requires codes for memories with defective cells also called wet paper codes. This

paper provides a new tool for steganography a coding method that empowers the steganographer with

the ability to use arbitrary selection channels while substantially decreasing the number of embedding

changes. The algorithm combines wet paper codes with matrix embedding arbitrary selection channels

and improved embedding efficiency using random linear codes of small co-dimension. In Tomas Filler

et. al.’s work [24], the authors propose a practical methodology for minimizing additive distortion in

steganography with general embedding operation which is more flexible and easy. Syndrome-Trellis

Codes (STC) are used to improve the security of the system. STC divides the samples into different bins

(binning) which is a common tool used for solving many information-theoretic and also data-hiding

problems. The proposed method can be used in both \spatial & transform domain. A proper distortion

function is chosen which makes statistical detection difficult. Once the steganographer specifies the

distortion function, the proposed framework provides all tools for constructing practical embedding

schemes. The distortion function or the embedding operations need not be shared with the recipient.

4.5 Distortion

Distortion techniques require the knowledge of the original cover in the decoding process. Sender

applies a sequence of modifications to a cover in order to get a stego-object,she chooses this sequences

of modifications in such a way that it corresponds to a specific secrete message she wants to transmit.

Receiver measures the difference to the original cover to reconstruct the sequence of modifications

applied by sender which corresponds to the secrete message.

In many applications, such systems are not useful, since the receiver must have access to the original

covers. If anyone also has the access to them, she can easily detect to cover modifications and has

evidence for a secrete communication. If the embedding and extraction functions are public and do not

depend on a stego -key, it is also possible for that person to reconstruct the secrete message entirely.

Throughout this section we will therefore assume that original covers can be distributed through a secure

channel.

An early approach to hiding information is in text. Most text-based hiding method are of distortion

type(i.e. the arrangement of words or the layout of a document may reveal information). One technique

is done by modulating the positions of lines and words which will be detailed in the next subsection.

Adding spaces and “invisible” characters to text provides a method to pass hidden information.

In D.P.Gaikwad et. al.’s paper [25]the authors propose image restoration technique in steganography.

The image is blurred before hiding the message image using special point spread function and randomly

generated key. Sequential LSB embedding in the R plane is done in this project. The number of rows

and columns of the message image is encrypted in the first row of the cover image. Before inserting, the

original message image is blurred using the specific PSF (Point Spread Function). The parameters used

for blurring with PSF are used as keys during deblurring.

The secret key values are sent through a secure channel (Tunnelling). The secret image is recovered

using the two keys and a third key, which is randomly generated and depends on the content of the

hiding message.

In Hamid.A.Jalab et. al.’s paper[26], a new information hiding system is presented using distortion.

The aim of the proposed system is to hide information (data file) within image page of execution file

(EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of

Page 9: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 535

the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to

identify hiding information, the proposed system considers overcoming this dilemma by using the

execution file as a cover file.

In M.B.Ould MEDENI et.al.’s article [27], the authors use error correcting codes in steganographic

protocols. An optimal code is one that makes most of the maximum embeddable (MLE). The method

referred to as matrix encoding requires the sender and recipient to agree in advance on a parity check

matrix H. The cover medium is processed to extract a sequence of symbols _, which is modified into s to

embed the message m, s is sometimes called the stegodata, and modifications on s are translated on the

cover-medium to obtain the stego-medium. Relation between steganographic algorithms and error

correcting codes are discussed.

4.6 Cover Generation

A cover generation method actually creates a cover for the sole purpose of hiding information. Spam

mimic is an excellent example of a cover generation method.

Cover generations have heavy and complexity process for algorithms compression with other

techniques. This point due to delay time for finished (hiding or extract) process option. Example

Automated Generation of English Text. Use a large dictionary of words categorized by different types,

and a style which describes how words of different types can be used to form a meaningful sentence.

Transform message bits into sentences by selecting words out of the dictionary which conforms to a

sentence structure given in the style source

Vivek sampat et. al. [28]propose an advanced system of audio steganography, which generates a

personalized cover dynamically for hiding data within itself. An attempt has been made to make the

generated cover meaningful by keeping in mind the concept of musical scales during the generation

process.

Some Steganographic applications generate a digital object only for the purpose of being a cover

for secret communication [29],[30].

V. CONCLUSION

Steganography might also become limited under laws, since governments already claimed that criminals

use these techniques to communicate. More restrictions on the use of privacy-protecting technologies are

not very unlikely, especially in this period of time with great anxiety of terrorist and other attacks.

REFERENCE [1] Artz, Donovan. "Digital steganography: hiding data within data."internet computing, IEEE 5.3 (2001): 75-80.

[2] Handel, T. & Sandford, M., Hiding data in the OSI network model, Proceedings of the 1st International Workshop on

Information Hiding, June (1996).

[3] N. Johnson and S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer, pp. 26-34, February (1998).

[4] Amin, Muhalim Mohamed, et al. "Information hiding using steganography." Telecommunication Technology, 2003.

NCTT 2003 Proceedings. 4th National Conference on. IEEE, 2003.

[5] J.C. Judge, Steganography: Past, present, future. SANS Institute

publication,http://www.sans.org/reading_room/whitepapers/stenganography/552.php, 2001.

[6] N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01

(3)(2003)32-44.

[7] P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083-2126.

[8] C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8th Annual Computer

Security Applications Conference, 30 Nov-4 Dec, 1992, pp. 153-159.

[9] C. Hosmer, Discovering hidden evidence, Journal of Digital Forensic Practice, (1)(2006)47-56.

Page 10: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of

International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 07, [July – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161

@IJMTER-2015, All rights Reserved 536

[10] J.C. Hernandez-Castro, I. Blasco-Lopez and J.M. Estevez-Tapiador, Steganography in games: A general methodology

and its application to the game of Go, Computers and Security, Elsevier Science, 25(2006) 64- 71.

[11] W. Bender, W. Butera, D. Gruhl, R. Hwang, F.J. Paiz and S. Pogreb, Applications for data hiding, IBM Systems

Journal, 39 (3&4)(2000) 547-568.

[12] K.H. Jung and K.Y. Yoo, Data hiding method using image interpolation, Computer Standards and Interfaces,

31(2)(2009) 465-470.

[13] Chi-Kwong Chan∗, L.M. Cheng, “Hiding data in images by simple LSB substitution”, the journal of the pattern

recognition society, 37 (2004) 469 – 474.

[14] Vijay Kumar Sharma ,Vishal Shrivastava, “A Steganography Algorithm For Hiding Image In Image By Improved Lsb

Substitution By Minimize Detection” , Journal of Theoretical and Applied Information Technology 15th February

2012. Vol. 36 No.1.

[15] Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu (2002), “A Fast And Secure Image Hiding Scheme Based on LSB

Substitution”, International Journal of Pattern Recognition and Artificial Intelligence,vol. 16, no. 4, p. 399-416.

[16] Thien, C. C., Lin, J. C. (2003), “A Simple and High-Hiding Capacity Method for Hiding Digit-By-Digit Data in Images

Based On Modulus Function”. Pattern Recognition, vol. 36, p. 2875-2881.

[17] Samir Kumar Bandyopadhyay , Tuhin Utsab Paul and Avishek Raychoudhury, “Genetic Algorithm Based Substitution

Technique Of Image Steganography”,Journal of Global Research in Computer Science, Volume 1, No. 5, December

2010

[18] Gurmeet Kaur and Aarti Kochhar, “ Transform Domain Analysis of Image Steganography” International Journal for

Science and Emerging Technologies with Latest Trends,6(1): 29-37 (2013)

[19] Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, “A Secure Color Image Steganography In Transform

Domain”, International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013.

[20] Prosanta Gope, Anil Kumar and Gaurav Luthra , (2010) “An Enhanced JPEG Steganography Scheme with Encryption

Technique”, International Journal of Computer and Electrical Engineering , Vol.2.No.5, pp924-930.

[21] S.Arivazhagan, W.Sylvia Lilly Jebarani, and S.Bagavath (2011) “Colour Image Steganography Using Median

Maintenance”, ICTACT Journal on Image and Video Processing, Vol. 2, Iss:01, pp.246-253.

[22] Tanmay Bhattacharya , Nilanjan Dey and S. R. Bhadra Chaudhuri , “ A Novel Session Based Dual Steganographic

Technique Using DWT and Spread Spectrum”International Journal of Modern Engineering Research (IJMER), Vol.1,

Issue1, pp-157-161.

[23] Chin-Chen Chang & Chih-Yang Lin (2006) “Reversible Steganography for VQ-Compressed Images Using Side

Matching and Relocation ”, IEEE Transactions on Information Forensics and Security, Vol. 1. No.4, pp 493-501. [24] Tomas Filler, Student Member, IEEE, Jan Judas and Jessica Fridrich, Member, IEEE, (2010) “Minimizing Additive

Distortion in Steganography using Syndrome Trellis Codes”, IEEE Article, pp.1-17. [25] D.P.Gaikwad and S.J.Wagh, (2010) “Colour Image Restoration For An Effective Steganography”, Imanager’s Journal

on Software Engineering, Vol.4 .No.3, pp.65-71. [26] Hamid.A.Jalab, A.A.Zaidan, B.B.Zaidan, “New Design for Information Hiding with in Steganography Using Distortion

Techniques”, IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February, 2010

[27] M.B.Ould MEDENI and El Mamoun SOUIDI, (2010) “Steganography and Error Correcting Codes”, International Journal of Computer Science and Information Security, Vol.8.No.8, pp147-149.

[28] Vivek Sampat et.al., “Audio Steganography using dynamic Cover Generation”, International Journal on Advanced

Computer Theory and Engineering, ISSN (Print) : 2319 – 2526, Volume-2, Issue-4, 2013

[29] Hamid.A.Jalab, A.A Zaidan, B.B Zaidan, “New Design for Information Hiding with in Steganography Using Distortion

Techniques”, International Journal of Engineering and Technology (IJET)), Vol 2, No. 1, ISSN: 1793-8236, Feb

(2010), Singapore.

[30] A.W. Naji, Shihab A. Hameed, B.B.Zaidan, Wajdi F. Al-Khateeb, Othman O. Khalifa, A.A.Zaidan and Teddy S.

Gunawan, “ Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between

Advance Encryption Standared and Distortion Techniques”, International Journal of Computer Science and Information

Security (IJCSIS), Vol. 3, No 1 ISSN: 1947-5500, P.P 73-78,3 Aug 2009, USA.

Page 11: Survey and Analysis of Current methods of … a nd Analysis of Current method s of Steganography ... Text Steganography: General technique in text steganography, such as numb er of