A Review Study on Unique Way of Information Hiding: Steganography
International Journal on Data Science and Technology
Volume 3, Issue 5, September 2017, Pages: 45-51
Received: Jul. 19, 2017; Accepted: Aug. 17, 2017; Published: Sep. 26, 2017
Views 1000      Downloads 49
Authors
Muhammad Zeeshan, Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan
Sibghat Ullah, Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan
Saadia Anayat, Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan
Rabia Ghulam Hussain, Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan
Nayab Nasir, Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan
Article Tools
Follow on us
Abstract
Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.
Keywords
Steganography, Algorithms, LSB, Depth of LSB, Distortion of Image
To cite this article
Muhammad Zeeshan, Sibghat Ullah, Saadia Anayat, Rabia Ghulam Hussain, Nayab Nasir, A Review Study on Unique Way of Information Hiding: Steganography, International Journal on Data Science and Technology. Vol. 3, No. 5, 2017, pp. 45-51. doi: 10.11648/j.ijdst.20170305.11
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Manini Manasmita and Sangita Roy, “A Novel Approach to Format Based Text Steganography”, KIIT University, India, 2011, pp. 511.
[2]
Very PDF Knowledge base website. [Online]. Available: http://www.verypdf.com/wordpress/201110/how-can-i-set-color-depth-and-resolution-settings-during-document-to-image-conversion-4898.html
[3]
Neil F. Johnson and Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE, George Mason University, 1998, pp. 26-30.
[4]
Yale C/AIM Web Style Guide website “Color Display Primer”. [Online]. Available:http://vesta.astro.amu.edu.pl/Library/WWW/Tutorial1/graphics/display_primer.html
[5]
Vijay Anand J. and Dharaneetharan G. D., “New Approach in Steganography by Integrating Different LSB Algorithms and Applying Randomization Concept to Enhance Security”, Kalasalingam University Srivilliputhur, Tamil Nadu, India, 1989, pp. 474-475.
[6]
Samir Kumar Bandyopadhyay et al., “Genetic Algorithm Based Substitution Technique of Image Steganography”, University of Calcutta, Kolkata, India, 2011, pp. 63.
[7]
Andreas Westfeld, “F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis” Institute for Sys. Arch., Germany, 2001, pp. 296-301.
[8]
Surbhi Singhania et. al. “A study on time complexity of least significant bit steganography”, Proc. Nat. Conf. “Science in Media 2012”, University of Science and Technology, Faridabad, Haryana (India) Dec. 3rd-4th 2012, pp. 125-126.
[9]
Namita Tiwari and Dr. Madhu Shandilya, “Evaluation of Various LSB based Methods of Image Steganography on GIF File Format”, Int. Journal of Computer Applications, Vol. 6– No. 2, Sept. 2010, pp. 2.
[10]
Ankit Gupta and Rahul Garg, “Detecting LSB Steganography in Images”, 2009, pp. 8-9.
[11]
Lip Yee Por et al., “An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm”, The Int. Arab Journal of Info. Tech., Vol. 10, No. 1, Jan. 2013, University of Malaya, Malaysia, 2013, pp. 53.
[12]
https://en.wikipedia.org/wiki/Steganography
[13]
G. S. a. V. Kumar, “A novel technique for Reversible Information Hiding,” Advances in Computational Sciences and Technology (Research India Publications) ISSN 0973-6107, vol. 10, no. 7, pp. 2069-2078, Number 7 (2017).
[14]
Vandana Yadav and Sanjay Kumar Sharma, “A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, no. 2, 30 April 2017.
[15]
V. I. *. P. L. T. Sivabalan A/L Patiburn, “Text Steganography using Daily Emotions Monitoring,” International Journal of Education and Management Engineering(IJEME), May 2017.
[16]
V. S. a. J. Fridrich, “EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES,” in Image Processing (ICIP), 2016 IEEE International Conference, Phoenix, AZ, USA, 25-28 Sept. 2016.
[17]
S. C. M. P. S. K. a. A. N. Pramod George Jose, “Hash and Salt based Steganographic Approach with Modified LSB Encoding,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 10599-10610, June 2016.
[18]
Harjit Singh, "Analysis of Different Types of Steganography" International Journal of Scientific Research in Science, Engineering and Technology, vol. 2, no. 3, PP. 578-582, 06 June 2016.
ADDRESS
Science Publishing Group
548 FASHION AVENUE
NEW YORK, NY 10018
U.S.A.
Tel: (001)347-688-8931