CFP last date
01 May 2024
Call for Paper
June Edition
CAE solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 01 May 2024

Submit your paper
Know more
Reseach Article

Steganography Literature Survey, Classification and Comparative Study

by Alaa Fkirin, Gamal Attiya, Ayman El-Sayed
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 10
Year of Publication: 2016
Authors: Alaa Fkirin, Gamal Attiya, Ayman El-Sayed
10.5120/cae2016652384

Alaa Fkirin, Gamal Attiya, Ayman El-Sayed . Steganography Literature Survey, Classification and Comparative Study. Communications on Applied Electronics. 5, 10 ( Sep 2016), 13-22. DOI=10.5120/cae2016652384

@article{ 10.5120/cae2016652384,
author = { Alaa Fkirin, Gamal Attiya, Ayman El-Sayed },
title = { Steganography Literature Survey, Classification and Comparative Study },
journal = { Communications on Applied Electronics },
issue_date = { Sep 2016 },
volume = { 5 },
number = { 10 },
month = { Sep },
year = { 2016 },
issn = { 2394-4714 },
pages = { 13-22 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume5/number10/657-2016652384/ },
doi = { 10.5120/cae2016652384 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:55:12.066668+05:30
%A Alaa Fkirin
%A Gamal Attiya
%A Ayman El-Sayed
%T Steganography Literature Survey, Classification and Comparative Study
%J Communications on Applied Electronics
%@ 2394-4714
%V 5
%N 10
%P 13-22
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Transmitting confidential images between two channels suffer from hacking. Therefore, protecting confidentiality has become a very essential issue. Recently, several methods are developed to protect important information. The main idea is based on embedding important information in multimedia carrier such as: text, image, audio, and video. The developed methods may be classified as steganography and watermarking. Steganography aims to embed huge amount of secret data in multimedia carrier while watermarking aims to hid small amount of secret data in multimedia carrier. This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.

References
  1. A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital image steganography : Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.
  2. R. Chandramouli, M. Kharrazi, and N. Memon, “Image Steganography and Steganalysis: Concepts and Practice,” in Digital Watermarking, Springer Berlin Heidelberg, 2004, pp. 35–49.
  3. E. E. A. Elgabar and H. A. A. Alamin, “Comparison of LSB Steganography in GIF and BMP Images,” International Journal of Soft Computing and Engineering (IJSCE), vol. 3, no. 4, pp. 79–83, 2013.
  4. L. Zhang, J. Wu, and N. Zhou, “Image Encryption with Discrete Fractional Cosine Transform and Chaos †,” in Proceeding of Fifth International Conference on Information Assurance and Security, 2009, pp. 61–64.
  5. P. Ajit and K. Chouhan, “A Study and literature Review on Image Steganography,” International Journal of Computer Science and Information Technologies (IJCSIT), vol. 6, no. 1, pp. 685–688, 2015.
  6. P. B. Kutade and P. S. A. Bhalotra, “A Survey on Various Approaches of Image Steganography,” International Journal of Computer Applications, vol. 109, no. 3, pp. 1–5, 2015.
  7. G. J. Simmons, “The Prisoners’ Problem and the Subliminal Channel,” in Advances in Cryptology: Proceedings of CRYPTO ’83, springer, 1983, pp. 51–67.
  8. N. Akhtar, P. Johri, and S. Khan, “Enhancing the Security and Quality of LSB Based Image Steganography,” in Proceeding of 5th International Conference on Computational Intelligence and Communication Networks, 2013, pp. 385 – 390.
  9. M. S. Subhedar and V. H. Mankar, “Current status and key issues in image steganography: A survey,” Computer Science Review, vol. 13–14, pp. 95–113, 2014.
  10. D. Salomon, Coding For Data And Computer Communications. California State University: Springer, 2005.
  11. N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” Computer, vol. 31, no. 2, 1998.
  12. M. Mishra and F. L. D. M. C. Adhikary, “An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography,” International Journal of Computer Science and Business Informatics, vol. 8, no. 1, pp. 1–12, 2013.
  13. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data A state-of-the-art overview,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20–46, 2000.
  14. S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding techniques for stegnography and digital watermarking. Artech House, Inc. Norwood, MA, USA, 2000.
  15. P. C. Mandal, “Modern Steganographic technique : A survey,” International Journal of Computer Science & Engineering Technology (IJCSET), vol. 3, no. 9, pp. 444–448, 2012.
  16. C. Kurak and J. McHugh, “A Cautionary Note On Image Downgrading,” in Proceeding of Computer Security Applications Conference, Eighth Annual, 1992, pp. 153–159.
  17. F. Petitcolas, “The information hiding homepage.” [Online]. Available: http://www.petitcolas.net/steganography/image_downgrading/.
  18. V. M. Potdar and E. Chang, “Grey Level Modification Steganography for Secret Communication,” in Proceeding of 2nd IEEE International Conference on Industrial Informatics, 2004, pp. 223 – 228.
  19. D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, no. 9–10, pp. 1613–1626, 2003.
  20. Xinpeng Zhang and S. Wang, “Vulnerability of pixel-value differencing stegnography to histogram analysis and modification for enhanced security,” Pattern Recognition Letters, vol. 25, no. 3, pp. 331–339, 2004.
  21. J. C. Joo, H. Y. Lee, and H. K. Lee, “Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function,” EURASIP Journal on Advances in Signal Processing, vol. 2010, pp. 1–13, 2010.
  22. C. H. Yang, C. Y. Weng, H. K. Tso, and S. J. Wang, “A data hiding scheme using the varieties of pixel-value differencing in multimedia images,” The Journal of Systems and Software, vol. 84, no. 4, pp. 669–678, 2011.
  23. Y. P. Lee, J. C. Lee, W. K. Chen, K. C. Chang, I. J. Su, and C. P. Chang, “High-payload image hiding with quality recovery using tri-way pixel-value differencing,” Information Sciences, vol. 191, pp. 214–225, 2012.
  24. G. Swain and S. K. Lenka, “Steganography using two sided , three sided , and four sided side match methods,” CSI Transactions on ICT, vol. 1, no. 2, pp. 127–133, 2013.
  25. B. Chen and G. W. Wornell, “Quantization Index Modulation : A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001.
  26. T. D. Kieu and C. C. Chang, “A steganographic scheme by fully exploiting modification directions,” Expert Systems with Applications, vol. 38, no. 8, pp. 10648–10657, 2011.
  27. C. C. Chang, T. S. Nguyen, and C. C. Lin, “A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies,” The Journal of Systems & Software, vol. 86, no. 2, pp. 389–402, 2013.
  28. H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, “Reversible image steganographic scheme via predictive coding,” Displays, vol. 31, no. 1, pp. 35–43, 2010.
  29. T. Bhattacharya, N. Dey, and S. R. B. Chaudhuri, “A Session based Multiple Image Hiding Technique using DWT and DCT,” International Journal of Computer Applications, vol. 38, no. 5, pp. 18–21, 2012.
  30. J. Jeswani and D. T. Sarode, “A New DCT based Color Video Watermarking using Luminance Component,” IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, pp. 83–90, 2014.
  31. C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE TRANSACTIONS ON IMAGE PROCESSING, vol. 8, no. 1, pp. 58–68, 1999.
  32. S. R. Hallur, S. Kuri, G. S. Sudi, and D. G.H.Kulkarni, “A Robust Digital Watermarking For Gray Scale Image,” International Journal For Technological Research In Engineering, vol. 2, no. 10, pp. 2440–2443, 2015.
  33. O. S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU - International Journal of Electronics and Communications, vol. 67, no. 3, pp. 189–196, 2013.
  34. D. Gupta and S. Choubey, “Discrete Wavelet Transform for Image Processing,” International Journal of Emerging Technology and Advanced Engineering, vol. 4, no. 3, pp. 598–602, 2015.
  35. E. E. D. Hemdan, N. El Fishawy, G. Attiya, and F. A. El-Samie, “Hybrid Digital Image Watermarking Technique for Data Hiding,” in Prceeding of 30th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2013), 2013, pp. 220–227.
  36. M. Jiansheng, L. Sukang, and T. Xiaomei, “A Digital Watermarking Algorithm Based On DCT and DWT,” in Proceeding of nternational Symposium on Web Information Systems and Applications, 2009, pp. 104–107.
  37. A. Al Haj, “Combined DWT-DCT digital image watermarking,” Journal of Computer Science, vol. 3, no. 9, pp. 740–746, 2007.
  38. G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD,” Computer Standards & Interfaces, vol. 31, no. 5, pp. 1002–1013, 2009.
  39. P. Rai, S. Gurung, and M. K. Ghose, “Analysis of Image Steganography Techniques : A Survey,” International Journal of Computer Applications, vol. 114, no. 1, pp. 11–17, 2015.
  40. E. E. D. Hemdan, N. El Fishawy, G. Attiya, and F. A. El-Samie, “An Efficient Image Watermarking approach based on Wavelet Fusion and Singular Value Decomposition in Wavelet Domain,” in Proceeding of 3rd International Conference on ADVANCED CONTROL CIRCUITS AND SYSTEMS (ACCS’013), 2013, no. 1–10.
  41. L. M. Marvel, C. G. Boncelet, and C. T. Retter, “Spread spectrum image steganography,” IEEE TRANSACTIONS ON IMAGE PROCESSING, vol. 8, no. 8, pp. 1075 – 1083, 1999.
  42. S. A. Halim and M. F. A. Sani, “Embedding Using Spread Spectrum Image Steganography with GF(2m),” in Proceedings of the 6th IMT-GT Conference on Mathematics, Statistics and its Applications, 2010, pp. 659–666.
  43. A. Valizadeh and Z. Jane Wang, “Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 6, no. 2, pp. 267 – 282, 2011.
  44. P. Sallee, “Model-Based Steganography,” in Digital Watermarking, Springer Berlin Heidelberg, 2004, pp. 154–167.
  45. M. Mahajan and D. N. Kaur, “Adaptive Steganography : A survey of Recent Statistical Aware Steganography Techniques,” International Journal of Computer Network and Information Security, vol. 4, no. 10, pp. 76–92, 2012.
  46. S. M. Mousavi, A. Naghsh, and S. A. R. A. Bakar, “Watermarking Techniques used in Medical Images : a Survey,” Journal of Digital Imaging, vol. 27, no. 6, pp. 714–729, 2014.
  47. R. Mehta and N. Rajpal, “A Hybrid Semi-Blind Gray Scale Image Watermarking Algorithm Based on DWT-SVD using Human Visual System Model,” in Proceeding of Sixth International Conference on Contemporary Computing (IC3), 2013, pp. 163–168.
  48. C. C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” Optics Communications, vol. 284, no. 4, pp. 938–944, 2011.
  49. P. Singh and S. Agarwal, “A Hybrid DCT- SVD Based Robust Watermarking Scheme for Copyright Protection,” in Proceeding of AFRICON, 2013, pp. 1–5.
  50. M. I. Khan, M. M. Rahman, and M. I. H. Sarker, “Digital Watermarking for Image Authentication Based on Combined DCT , DWT and SVD Transformation,” International Journal of Computer Science Issues, vol. 10, no. 3, pp. 223–230, 2013.
  51. P. Tao and A. M. Eskicioglu, “A robust multiple watermarking scheme in the Discrete Wavelet Transform domain,” in Proceedings of the International Society for Optical Engineering (SPIE), 2004, pp. 133–144.
  52. P. S. Murty, S. D. Kumar, and P. R. Kumar., “A Semi Blind Self Reference Image Watermarking in Discrete Cosine Transform using Singular Value Decomposition,” International Journal of Computer Applications, vol. 62, no. 13, pp. 29–36, 2013.
  53. M. M. Rahman, “A dwt, dct and svd based watermarking technique to protect the image piracy,” International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT), vol. 4, no. 2, 2013.
  54. L. K. Saini and V. Shrivastava, “A New Hybrid DWT-DCT Algorithm for Digital Image Watermarking,” International Journal of Advance Engineering and Research Development (IJAERD), vol. 1, no. 5, pp. 1–8, 2014.
  55. S. Sirmour and A. Tiwari, “A Hybrid DWT-SVD Based Digital Image Watermarking Algorithm for Copyright Protection,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 6, pp. 7–10, 2014.
  56. M. Tikariha and A. K. Dey, “An Efficient JND based Digital Image Watermarking using Hybrid DWT-DCT-SVD Approach,” INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR), vol. 10, no. 1, pp. 11–20, 2015.
  57. I. Avcıbas, B. Sankur, and K. Sayood, “Statistical evaluation of image quality measures,” Journal of Electronic Imaging, vol. 11, no. 2, pp. 206–223, 2002.
  58. I. Avcıbas, N. Memon, and B. Sankur, “Steganalysis Using Image Quality Metrics,” IEEE TRANSACTIONS ON IMAGE PROCESSING, vol. 12, no. 2, pp. 221–229, 2003.
  59. M. A. Mohamed and A. M. El Mohandes, “Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 1, pp. 394–401, 2012.
  60. S. P. Maity and M. K. Kundu, “Perceptually adaptive spread transform image watermarking scheme using Hadamard transform,” Information Sciences, vol. 181, no. 3, pp. 450–465, 2011.
  61. X. Zhang and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67–70, 2005.
  62. S. Singh and V. K. Attri, “State-of-the-art Review on Steganographic Techniques,” International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 8, no. 7, pp. 161–170, 2015.
  63. R. K. Nayak, P. A. Saxena, and D. M. Manoria, “A Survey & Applications of Various Watermarking & Encryption Techniques,” International Journal of Scientific & Engineering Research, vol. 6, no. 5, pp. 1532–1537, 2015.
  64. C. C. Lai and C. C. Tsai, “Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition,” IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, pp. 3060–3063, 2010.
  65. C. C. Chang, P. Tsai, and C. C. Linc, “SVD-based digital image watermarking scheme,” Pattern Recognition Letters, vol. 26, no. 10, pp. 1577–1586, 2005.
  66. A. A. Hanafy, G. I. Salama, and Y. Z. Mohasseb, “A secure covert communication model based on video steganography,” in Proceeding of IEEE Military Communications Conference (MILCOM), 2008, pp. 1 – 6.
Index Terms

Computer Science
Information Sciences

Keywords

Information Hiding Steganography Encryption Stego Cover grafia