A Survey of Different Steganography Techniques

Document Type : Original Article

Authors

1 Engineering Dep., Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt.

2 Electronics and Electrical Communications Engineering Dep., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt

Abstract

Steganography is defined as the art and science of embedding data
in a cover object without leaving a remarkable track on the cover
object, in other words it is the study of invisible communications. It is
usually dealing with the methods of hiding the existence of data to
be transmitted in such a way that, it remains confidential. The main
objectives of steganography are high capacity of the hidden data,
perceptual transparency (invisibility), temper resistance,
undetectability, computation complexity and robustness. It is
classified into three categories which are; pure (no key), secret key,
public key steganography. According to the type of the cover object,
there are different types of steganography which are; image, audio,
video, network and text. In the image steganography, the secrecy
can be achieved by hiding data into the cover image and generating
the stego-image. According to the embedding techniques, there are
different techniques of steganography which are those embedding
in the spatial domain (substitution method), those embedding in the
transform domain (frequency domain), spread spectrum techniques,
distortion techniques, masking and filtering techniques, and cover
generation techniques. Each of these techniques has its strengths
and weaknesses for different algorithms. This paper presents a
review of these techniques; the different algorithms, concepts,
advantages and disadvantages. The steps of the different
algorithms of these techniques will presented in details, with a
comparison between all these techniques. The different applications
of steganography, the attacks, and the robust image steganography
against attacks are presented. Lastly, the future and the novel
trends in steganography are presented.


xt-stroke-width: 0px; "> [1] S. Deepa and R. Umarani, "A Study on Digital Image Steganography",
International Journal of Advanced Research in Computer Science and
Software Engineering (IJARCSSE), Vol. 3, Issue 1, pp. 54 57, January
2013.
[2] H. Al-Bahadili, "A Secure Block Permutation Image Steganography
Algorithm", International Journal on Cryptography and Information
Security (IJCIS), Vol. 3, No. 3, pp. 11 22, September 2013.
[3] K. D. Megha, N. P. Vaidya and K. Patel, "Digital Watermarking: Data
Hiding Techniques using DCT-DWT Algorithm", International Journal of
Advanced Research in Computer and Communication Engineering
(IJARCCE), Vol. 2, Issue 6, pp. 2397 2402, June 2013.
[4] G. Kaur and K. Kaur, "Digital Watermarking and Other Data Hiding
Techniques", International Journal of Innovative Technology and
Exploring Engineering (IJITEE), Vol. 2, Issue 5, pp. 181 184, April
2013.
[5] K. Challita and H. Farhat, "Combining Steganography and Cryptography:
New Directions", International Journal on New Computer Architectures
and Their Applications (IJNCAA), Vol. 1 Issue 1, pp. 199 208, 2011.
[6] O. C. Abikoye, K. S. Adewole and A. J. Oladipupo, "Efficient Data Hiding
System using Cryptography and Steganography", International Journal of
Applied Information Systems (IJAIS), Volume 4, No. 11, pp. 6 11,
December 2012.
[7] M. K. I. Rahmani, K. Arora and N. Pal, "A Crypto-Steganography: A
Survey", International Journal of Advanced Computer Science and
Applications (IJACSA), Vol. 5, No. 7, pp. 149 155, 2014.
[8] A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, "Digital Image
Steganography: Survey and Analysis of Current Methods", Signal
Processing, Elsevier, Vol. 90, Issue 3, pp. 727 752, March 2010.
[9] M. Juneja and P. S. Sandhu, "Data Hiding with Enhanced LSB
Steganography and Cryptography for RGB Color Images", International
Journal of Applied Research, Vol. 3, No. 5, pp. 118 120, May 2013.
[10] C. P. Sumathi, T. Santanam and G. Umamaheswari, "A Study of Various
Steganographic Techniques Used for Information Hiding", International
Journal of Computer Science & Engineering Survey (IJCSES), Vol. 4, No.
6, pp. 9 25, December 2013.
[11] J. Kour and D. Verma, "Steganography Techniques A Review Paper",
International Journal of Emerging Research in Management &
Technology, Vol. 3, Issue 5, pp. 132 135, May 2014.
[12] F. M. Shelke, A. A. Dongre and P. D. Soni, "Comparison of Different
Techniques for Steganography in Images", International Journal of -stroke-width: 0px; "> Application or Innovation in Engineering & Management (IJAIEM), Vol.
3, Issue 2, pp. 171 176, February 2014.
[13] M. Umamaheswari, S. Sivasubramanian and S. Pandiarajan, "Analysis of
Different Steganographic Algorithms for Secured Data Hiding",
International Journal of Computer Science and Network Security
(IJCSNS), Vol. 10, No. 8, pp. 154 160, August 2010.
[14] R. G. Bal and P. Ezhilarasu, "An Efficient Safe and Secured Video
Steganography Using Shadow Derivation", International Journal of
Innovative Research in Computer and Communication Engineering
(IJIRCCE), Vol. 2, Issue 3, pp. 3251 3258, March 2014.
[15] A. Chadha, N. Satam, R. Sood and D. Bade, "An Efficient Method for
Image and Audio Steganography using Least Significant Bit (LSB)
Substitution", International Journal of Computer Applications (IJCA), Vol.
77, No. 13, pp. 37 45, September 2013.
[16] M. Nosrati, R. Karimi and M. Hariri, "An Introduction to Steganography
Methods", World Applied Programming, Vol. 1, No. 3, pp. 191 195,
August 2011.
[17] T. Handel and M. Sandford, "Hiding Data in the OSI Network Model",
Proceedings of the 1st International Workshop on Information Hiding, pp.
23 38, June 1996.
[18] M. Hussain and M. Hussain, "A Survey of Image Steganography
Techniques", International Journal of Advanced Science and Technology,
Vol. 54, pp. 113 124, May 2013.
[19] E. Dagar and S. Dagar, "Comparative Study of Various Steganography
Techniques", International Journal of Emerging Engineering Research and
Technology (IJEERT), Vol. 2, Issue 2, pp. 30 36, May 2014.
[20] S. Singh and T. J. Siddiqui, "A Security Enhanced Robust Steganography
Algorithm for Data Hiding", International Journal of Computer Science
Issues (IJCSI), Vol. 9, Issue 3, No. 1, pp. 131- 139, May 2012.
[21] A. A. El-Zoghabi, A. H. Yassin and H. H. Hussien, "Public Key
Steganography using LSB Method with Chaotic Neural Network",
International Journal of Computer Engineering and Technology (IJCET),
Vol. 5, Issue 8, pp. 118 129, August 2014.
[22] Z. Kh. AL-Ani, A. A. Zaidan, B .B. Zaidan and H. O. Alanazi, "Overview:
Main Fundamentals for Steganography", Journal of Computing, Vol. 2,
Issue 3, pp. 158 165, March 2010.
[23] M. Mishra, P. Mishra and M. C. Adhikary, "Digital Image Data Hiding
Techniques: A Comparative Study", ANSVESA, Vol. 7, No. 2, pp. 105-
115, 2012.
[24] Chetan, D. Sharma, "A Survey of Image Compression and Steganography
Techniques", International Journal of Advanced Research in Computer
Science and Software Engineering (IJARCSSE), Vol. 5, Issue 4, pp. 727