Subject Review: Information Steganography Based on Different Methods

Authors

  • Amal Abdulbaqi Maryoosh Mustansiriyah University, Iraq
  • Zahraa Salah Dhaief Mustansiriyah University, Baghdad Iraq
  • Raniah Ali Mustafa Mustansiriyah University, Baghdad Iraq

DOI:

https://doi.org/10.31695/IJASRE.2021.33985

Keywords:

Steganography, Cryptography, LSB, DCT, DWT, SLT, IWD.

Abstract

Today, huge amounts of information are transmitted over the communication networks, especially via the Internet. Therefore, many individuals are concerned with data security. Various methods were appeared to maintain data security, and the most common of these methods are cryptography. Encryption methods are exposed to many attacks, and if the attacker obtains the key, the data is decrypted, so many algorithms have emerged to hide the information within the multimedia. When the attacker gets the data, he will not suspect that this multimedia may contain other information. Data security may depend on the type of hiding algorithm used and sometimes encryption is used in conjunction with hiding to increase data security. The major aim of this work is reviewing and describing many approaches utilized for hiding data within multimedia and to create a comparison of these methods.

References

Sandeep Singh and Aman Singh, “A Review on the Various Recent Steganography Techniques”, International Journal of Computer Science and Network, December 2013, Volume 2, Issue 6.

Ahmad Shaik, V. Thanikaiselvan and Rengarajan Amitharajan, “Data Security Through Data Hiding in Images: A Review”, Journal of Artificial Intelligence, 2017, 10 (1):1-21.

Rosziati Ibrahim and Teoh Suk Kuan, “Steganography Algorithm to Hide Secret Message inside an Image”, Computer Technology and Application 2 (2011) 102-108.

Rig Das and Themrichon Tuithung, “A Novel Steganography Method for Image Based on Huffman Encoding”, IEEE, 2012.

Mazhar Tayel, Hamed Shawky and Alaa El-Din Sayed Hafez, “A New Chaos Steganography Algorithm for Hiding Multimedia Data”, ICACT2012, Feb. 2012, pp.19-22.

Kshetrimayum Jenita Devi, Bachelor thesis, “A Sesure Image Steganography Using LSB Technique and Pseudo Random Encoding Technique”, Department of Computer Science and Engineering National Institute of Technology-Rourkela Odisha, 2013.

N Sathisha et al., “CONDITIONAL ENTRENCH SPATIAL DOMAIN STEGANOGRAPHY”, Signal & Image Processing: An International Journal (SIPIJ), June 2014 Vol.5, No.3.

Odai M. Al-Shatanawi and Nameer N. El. Emam, “A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS SELECTION”, International Journal of Network Security & Its Applications (IJNSA), March 2015 Vol.7, No.2.

Atheer Alaa Sabri and Marwa Jaleel Mohsin, “A New Algorithm for a Steganography System”, Eng. &Tech.Journal, 2015, Vol.33, Part (A), No.8.

Saja M. Saraireh and Aser M. Matarneh, “HIGHER LEVEL SECURITY APPROACH FOR DATA COMMUNICATION SYSTEM BASED ON AES CRYPTOGRAPHY AND DWT STEGANOGRAPHY”, Jordanian Journal of Computers and Information Technology (JJCIT), December 2016, Vol. 2, No. 3.

Mohammed J. Bawaneh, “A Preferential Virtual Gray Scale Image Steganography Using Intelligent Water Drop”, International Journal of Computer Science and Information Security (IJCSIS), November 2016, Vol. 14, No. 11.

A. Soria-Lorente and S. Berres, “A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information”, Security and Communication Networks, Volume 2017.

Abdullah M. Hamdan and Ala Hamarsheh, “AH4S: an algorithm of text in text steganography using the structure of omega network”, SECURITY AND COMMUNICATION NETWORKS, February 2017, 9:6004–6016.

K.Rosemary Euphrasia and M. Mary Shanthi Rani, “Steganography in DCT-based compressed images through Modified Quantization and Matrix Encoding”, International Journal of Computer Science and Information Security (IJCSIS), February 2017, Vol. 15, No. 2.

Srilekha Mukherjee et al., “Image Steganography Using Mid Position Value Technique”, International Conference on Computational Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science 132 (2018) 461–468.

Kamaldeep Joshi et al., “A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image”, Hindawi, Journal of Computer Networks and Communications, Volume 2018.

Ambika, Rajkumar L. Biradar and Vishwanath Burkpalli, “Encryption-based steganography of images by multiobjective whale optimal pixel Selection”, INTERNATIONAL JOURNAL OF COMPUTERS AND APPLICATIONS, 2019.

Ashraful Tauhid et al., “A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform”, Journal of Information Security, 2019, 10, 117-129.

Pyung-Han Kim et al., “Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images”, Hindawi, Security and Communication Networks, Volume 2019.

Jingzhi Lin et al., “A New Steganography Method for Dynamic GIF Images Based on Palette Sort”, Hindawi,Wireless Communications and Mobile Computing, Volume 2020.

Zeyad Safaa Younus and Ghada Thanoon Younus, “Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data”, J. Intell. Syst. 2020; 29(1): pp.1216–1225.

Downloads

How to Cite

Amal Abdulbaqi Maryoosh, Zahraa Salah Dhaief, & Raniah Ali Mustafa. (2021). Subject Review: Information Steganography Based on Different Methods. International Journal of Advances in Scientific Research and Engineering (IJASRE), ISSN:2454-8006, DOI: 10.31695/IJASRE, 7(3), 71–77. https://doi.org/10.31695/IJASRE.2021.33985

Issue

Section

Review Article