| Peer-Reviewed

A Review Study on Unique Way of Information Hiding: Steganography

Received: 19 July 2017    Accepted: 17 August 2017    Published: 26 September 2017
Views:       Downloads:
Abstract

Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.

Published in International Journal on Data Science and Technology (Volume 3, Issue 5)
DOI 10.11648/j.ijdst.20170305.11
Page(s) 45-51
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Steganography, Algorithms, LSB, Depth of LSB, Distortion of Image

References
[1] Manini Manasmita and Sangita Roy, “A Novel Approach to Format Based Text Steganography”, KIIT University, India, 2011, pp. 511.
[2] Very PDF Knowledge base website. [Online]. Available: http://www.verypdf.com/wordpress/201110/how-can-i-set-color-depth-and-resolution-settings-during-document-to-image-conversion-4898.html
[3] Neil F. Johnson and Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE, George Mason University, 1998, pp. 26-30.
[4] Yale C/AIM Web Style Guide website “Color Display Primer”. [Online]. Available:http://vesta.astro.amu.edu.pl/Library/WWW/Tutorial1/graphics/display_primer.html
[5] Vijay Anand J. and Dharaneetharan G. D., “New Approach in Steganography by Integrating Different LSB Algorithms and Applying Randomization Concept to Enhance Security”, Kalasalingam University Srivilliputhur, Tamil Nadu, India, 1989, pp. 474-475.
[6] Samir Kumar Bandyopadhyay et al., “Genetic Algorithm Based Substitution Technique of Image Steganography”, University of Calcutta, Kolkata, India, 2011, pp. 63.
[7] Andreas Westfeld, “F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis” Institute for Sys. Arch., Germany, 2001, pp. 296-301.
[8] Surbhi Singhania et. al. “A study on time complexity of least significant bit steganography”, Proc. Nat. Conf. “Science in Media 2012”, University of Science and Technology, Faridabad, Haryana (India) Dec. 3rd-4th 2012, pp. 125-126.
[9] Namita Tiwari and Dr. Madhu Shandilya, “Evaluation of Various LSB based Methods of Image Steganography on GIF File Format”, Int. Journal of Computer Applications, Vol. 6– No. 2, Sept. 2010, pp. 2.
[10] Ankit Gupta and Rahul Garg, “Detecting LSB Steganography in Images”, 2009, pp. 8-9.
[11] Lip Yee Por et al., “An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm”, The Int. Arab Journal of Info. Tech., Vol. 10, No. 1, Jan. 2013, University of Malaya, Malaysia, 2013, pp. 53.
[12] https://en.wikipedia.org/wiki/Steganography
[13] G. S. a. V. Kumar, “A novel technique for Reversible Information Hiding,” Advances in Computational Sciences and Technology (Research India Publications) ISSN 0973-6107, vol. 10, no. 7, pp. 2069-2078, Number 7 (2017).
[14] Vandana Yadav and Sanjay Kumar Sharma, “A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, no. 2, 30 April 2017.
[15] V. I. *. P. L. T. Sivabalan A/L Patiburn, “Text Steganography using Daily Emotions Monitoring,” International Journal of Education and Management Engineering(IJEME), May 2017.
[16] V. S. a. J. Fridrich, “EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES,” in Image Processing (ICIP), 2016 IEEE International Conference, Phoenix, AZ, USA, 25-28 Sept. 2016.
[17] S. C. M. P. S. K. a. A. N. Pramod George Jose, “Hash and Salt based Steganographic Approach with Modified LSB Encoding,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 10599-10610, June 2016.
[18] Harjit Singh, "Analysis of Different Types of Steganography" International Journal of Scientific Research in Science, Engineering and Technology, vol. 2, no. 3, PP. 578-582, 06 June 2016.
Cite This Article
  • APA Style

    Muhammad Zeeshan, Sibghat Ullah, Saadia Anayat, Rabia Ghulam Hussain, Nayab Nasir. (2017). A Review Study on Unique Way of Information Hiding: Steganography. International Journal on Data Science and Technology, 3(5), 45-51. https://doi.org/10.11648/j.ijdst.20170305.11

    Copy | Download

    ACS Style

    Muhammad Zeeshan; Sibghat Ullah; Saadia Anayat; Rabia Ghulam Hussain; Nayab Nasir. A Review Study on Unique Way of Information Hiding: Steganography. Int. J. Data Sci. Technol. 2017, 3(5), 45-51. doi: 10.11648/j.ijdst.20170305.11

    Copy | Download

    AMA Style

    Muhammad Zeeshan, Sibghat Ullah, Saadia Anayat, Rabia Ghulam Hussain, Nayab Nasir. A Review Study on Unique Way of Information Hiding: Steganography. Int J Data Sci Technol. 2017;3(5):45-51. doi: 10.11648/j.ijdst.20170305.11

    Copy | Download

  • @article{10.11648/j.ijdst.20170305.11,
      author = {Muhammad Zeeshan and Sibghat Ullah and Saadia Anayat and Rabia Ghulam Hussain and Nayab Nasir},
      title = {A Review Study on Unique Way of Information Hiding: Steganography},
      journal = {International Journal on Data Science and Technology},
      volume = {3},
      number = {5},
      pages = {45-51},
      doi = {10.11648/j.ijdst.20170305.11},
      url = {https://doi.org/10.11648/j.ijdst.20170305.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijdst.20170305.11},
      abstract = {Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - A Review Study on Unique Way of Information Hiding: Steganography
    AU  - Muhammad Zeeshan
    AU  - Sibghat Ullah
    AU  - Saadia Anayat
    AU  - Rabia Ghulam Hussain
    AU  - Nayab Nasir
    Y1  - 2017/09/26
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ijdst.20170305.11
    DO  - 10.11648/j.ijdst.20170305.11
    T2  - International Journal on Data Science and Technology
    JF  - International Journal on Data Science and Technology
    JO  - International Journal on Data Science and Technology
    SP  - 45
    EP  - 51
    PB  - Science Publishing Group
    SN  - 2472-2235
    UR  - https://doi.org/10.11648/j.ijdst.20170305.11
    AB  - Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.
    VL  - 3
    IS  - 5
    ER  - 

    Copy | Download

Author Information
  • Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan

  • Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan

  • Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan

  • Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan

  • Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan

  • Sections