In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
This document discusses a new image steganography method that uses zero order hold (ZOH) zooming and reversible data hiding techniques to hide secret messages in cover images. The proposed method aims to improve on existing techniques by introducing less noise and allowing for lossy image compression schemes. It uses ZOH and least significant bit (LSB) techniques to embed data in the encrypted cover image. Experimental results showed the proposed ZOH method achieved higher peak signal-to-noise ratios than other methods, indicating improved stego image quality. The goal is to hide secret messages in cover images in a way that is difficult for humans to detect visually.
analysis on concealing information within non secret dataVema Reddy
Steganography is the art of covered writing or hidden writing. The steganography can be done in six types of techniques, namely: substitution system technique, transform domain technique, spread spectrum technique, statistical method technique, distortion technique and cover generation technique. This ppt deals with substitution system technique and transforms domain technique. This ppt deals with four methods of steganography, namely: plain LSB steganography, inverted LSB steganography, pattern based steganography and twosided, threesided, foursided side matched methods
steganography. The performance and evaluation of these methods are shown in the ppt.
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganographyn involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-à-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. It is noteworthy that each of these cover media has different special attributes that are altered by a steganography algorithm in such a way that the changes are not perceivable for the unintended recipients; but, the changes are identifiable using appropriate steganlysis algorithms. We anticipate that this paper can also give a clear picture of the current trends in
steganography so that we can develop and improvise appropriate steganlysis algorithms.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
The document discusses combining cryptography and steganography to securely transmit secret messages. It proposes encrypting a secret image using DES encryption and hiding the encrypted image in the least significant bits of cover images. The algorithm and block diagrams for encryption, embedding, retrieval and decryption are described. Experimental results comparing embedding in the 1st-2nd vs 3rd-4th least significant bits are shown, with the former being less perceptible. The conclusion is that combining cryptography and steganography increases security, and the encrypted images can be accurately retrieved and decrypted.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
This document proposes a new technique for retrieving hidden information from an image using mobile communications. The sender embeds data into an image using histogram modification and sends it to the receiver. The receiver must enter the sender's mobile number to retrieve a password, which is then used to manually extract the hidden data from the image. The use of mobile communication for password delivery increases security by authenticating that the receiver is authorized to view the hidden data. The proposed methodology involves steps for data hiding on the sender's side and extraction on the receiver's side using a mobile-based password system.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
Image Steganography Techniques: An OverviewCSCJournals
Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
This document discusses a new image steganography method that uses zero order hold (ZOH) zooming and reversible data hiding techniques to hide secret messages in cover images. The proposed method aims to improve on existing techniques by introducing less noise and allowing for lossy image compression schemes. It uses ZOH and least significant bit (LSB) techniques to embed data in the encrypted cover image. Experimental results showed the proposed ZOH method achieved higher peak signal-to-noise ratios than other methods, indicating improved stego image quality. The goal is to hide secret messages in cover images in a way that is difficult for humans to detect visually.
analysis on concealing information within non secret dataVema Reddy
Steganography is the art of covered writing or hidden writing. The steganography can be done in six types of techniques, namely: substitution system technique, transform domain technique, spread spectrum technique, statistical method technique, distortion technique and cover generation technique. This ppt deals with substitution system technique and transforms domain technique. This ppt deals with four methods of steganography, namely: plain LSB steganography, inverted LSB steganography, pattern based steganography and twosided, threesided, foursided side matched methods
steganography. The performance and evaluation of these methods are shown in the ppt.
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganographyn involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-à-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. It is noteworthy that each of these cover media has different special attributes that are altered by a steganography algorithm in such a way that the changes are not perceivable for the unintended recipients; but, the changes are identifiable using appropriate steganlysis algorithms. We anticipate that this paper can also give a clear picture of the current trends in
steganography so that we can develop and improvise appropriate steganlysis algorithms.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
The document discusses combining cryptography and steganography to securely transmit secret messages. It proposes encrypting a secret image using DES encryption and hiding the encrypted image in the least significant bits of cover images. The algorithm and block diagrams for encryption, embedding, retrieval and decryption are described. Experimental results comparing embedding in the 1st-2nd vs 3rd-4th least significant bits are shown, with the former being less perceptible. The conclusion is that combining cryptography and steganography increases security, and the encrypted images can be accurately retrieved and decrypted.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
This document proposes a new technique for retrieving hidden information from an image using mobile communications. The sender embeds data into an image using histogram modification and sends it to the receiver. The receiver must enter the sender's mobile number to retrieve a password, which is then used to manually extract the hidden data from the image. The use of mobile communication for password delivery increases security by authenticating that the receiver is authorized to view the hidden data. The proposed methodology involves steps for data hiding on the sender's side and extraction on the receiver's side using a mobile-based password system.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
Image Steganography Techniques: An OverviewCSCJournals
Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
In this result paper we will show the implementation result of our proposed method. Steganography is an art and
science of Hide the data in a cover image using some techniques that it remains undetected by the unauthorized access. We hide
the data in a manner that the stego image looks like a single entry by any third person. No one has doubt that the image is the
stego image. We use some different methods that keep data to be secret. It is a powerful tool for security with which we can
keep the data secret behind an object. An object may be Text, Audio, Video, and Image. The factor that affects the steganography
methods are PSNR, MSE, Payload Capacity and BER. Security of data will be shown by the Histogram of picture.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
This document summarizes a research paper that proposes a new methodology for reducing additive distortion in steganography. The paper introduces a method to embed 2 bits of information in a pixel by altering only one bit plane. This is expected to make detection of covert communication more difficult for steganalysis algorithms compared to altering the least significant bit. The method uses Java for implementation and MATLAB to analyze histograms of original and stego images. Experimental results on embedding secret text in images are presented, along with analysis of the distortion levels and security of the proposed approach.
The document provides an introduction to stenography, which is the ancient art of hiding messages so they are not detectable. It discusses how stenography aims to hide the existence of a message, while cryptography scrambles it so it cannot be understood. It then reviews traditional stenography methods used before digital means, and outlines some key terms like cover image and stego image. The document proposes an edge adaptive scheme for digital image stenography and discusses advantages like messages not attracting attention. It also reviews some applications of stenography like digital watermarking and discusses the technique's future scope.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
Similar to Digital Steganography in Computer Forensics (20)
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
Digital Steganography in Computer Forensics
1. Digital Steganography in Computer Forensics
Nawal Alsaidi #1
, Majda Alshareef ∗2
, Afnan Alsulami #3
,Maram Alsafri #4
, Asia Aljahdali #5
College of Computer Science and Engineering, Cybersecurity Department
, University of Jeddah
Saudi Arabia
1
nrajealsaidi.stu@uj.edu.sa
2
malsharif0133@uj.edu.sa
3
aalsulami200@uj.edu.sa
4
malsafri0002.stu@uj.edu.sa
5
aoaljahdali@emory.eduu
Abstract—In this study, we present how digital steganography
can be analyzed in computer forensic. Computer forensics is a
scientific study of computers in a manner consistent with the
principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information
within different media. In this paper, we will discuss how the
criminal can use steganography to hide evidence and tracks, and
how the steganalysis for computer forensic can be done. There are
different types of steganography, such as image, text, video, and
audio steganography, all will be discussed in detail. The paper
will focus on how the investigator can detect the steganography in
all its forms using several techniques. The main goal of this paper
is to assist computer forensics investigators in knowing how the
criminals can conduct their crimes and obscure evidence from
computer systems using steganography techniques.
Index Terms—Steganography, Forensics, Detection
I. INTRODUCTION
Computer forensics is a part of digital forensics science.
It depends on the extraction of evidence from the computer
and examined it to save, identify, retrieve, and analyze data
for investigations into cybercrime. The use of stored data in
networks to commit a criminal act is defined as a computer
crime. Advanced and new investigations methods are required
to deal with the increase in potential harm caused by computer
crimes [1]. A large part of the work of a computer forensic
expert entails being involved in the discovery of latent or
hidden data within computer systems. Steganography is one of
the hiding techniques that can be used. The computer forensic
process involves: collecting, analyzing, and displaying discov-
ered digital data. The term digital forensics refers to a type of
forensic science linked to computers to help judges identify
the perpetrator and the circumstances of the case. To enhance
the computer forensic environment, we are required to resolve
the issue of computer forensic examination tools and strategy.
Various types of hardware and software tools are available
for computer forensic. Steganalysis is the mechanism used to
detect steganography process [2]. This paper is organized as
follows: section 2 discusses steganalysis for computer forensic
investigation. Section 3, 4, 5, 6, and 7 describe the four types
of steganography and their techniques. Part 8 explores how
steganography can be detected for investigation purposes.
II. STEGANALYSIS FOR COMPUTER FORENSIC
INVESTIGATION
Computer crime and cybercrime are today’s significant
challenges. The perpetrator stores the document and details in
a register to make things identifiable impossible. And thus,
computer forensics is a criminal investigation that is done
within the institution that the suspect operates. In the analysis
of Steganography slack points, automated forensics is used. As
the remains of previous records, codes that can directly access
slack unallocated space can be written, the examiners become
acquainted with the knowledge that resides in the slack or
unallocated room. It is possible to hide tiny amounts of data
in unused file headers as well. Digital forensic experts research
network channels such as TCP/IP protocol because this sends
data that triggers offenses such as illicit messaging, theft,
manipulating electronic payments, gaming, and prostitution,
abuse, malware, pedophilia. Today’s technology is much more
sophisticated, which has both positive and negative effects.
The increased crime rate is one of the significant adverse
impacts of improved technology. This degree of criminality
is conducted using investigative analysis methods [3].
III. STEGANOGRAPHY TYPES
Message and carrier are the two fundamental components
in steganography. The message is the embedded data, and the
carrier is the object that uses the word. The increased use
of modern communication has been growing recently, so it
requires to be more secure, especially on computer networks.
The variety of multimedia formats can include an image,
audio, video, and text, etc. As a result of that, these forms
have to be visible to human hiding, and the best solution is
steganography. Steganography types are image, text, audio,
and video. The central concept of Image Steganography is
the process of hiding the data within an image so that it
will be invisible to the eye in the original image. Taking
the cover object as an image to conceal the information,
and it depends on the quality of the pixels to hide the data.
In audio steganography, an audio file (such as WAV, AU,
and MP3) is used as a cover file to overlay the confidential
message with the help of the Human Hearing System (HAS).
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
54 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. Video Steganography is a steganography extension of the
image. But as the video content is complex, the chances
of hidden information being detected are lower compared to
videos. Videos have new data hiding features, such as hiding
messages in components of the movement. The video file’s
audio components can also be used to hide data. In text files
steganography, the structure of text documents is identical to
what we observe. In contrast, other types of materials, such
as in the image, the formation of a document is different
from what we see. Therefore, in such reports, we can hide
information by making changes in the structure of the paper
without making a notable change in the target output [4].
IV. IMAGE STEGANOGRAPHY
Images are the most common cover objects used for
steganography. An image is a collection of numbers that con-
stitute different light intensities in different areas of the picture.
Images consist of pixels that may describe a representation
form of a grid and individual points. Also, these pixels are
visualized row horizontally by row to form an image, and
each pixel uses 8 bits, which is called a bit depth. The term
bit depth can describe the number of bits in a color scheme,
too. This means that every 8 bits are used to describe the color
of each pixel. Information hiding through the use of secret
messages within entire pixels of images is a standard technique
to spread an image over the World Wide Web. Criminals tend
to hide a message inside an image invisibly, which cannot be
seen by the human visual system. So, one way of unearthing
hidden information within the image can be done by changing
the entire properties of the images’ pixels by using some
techniques to make it visible to the human vision [5].
A. Image Steganography Techniques
To extract the embedded information, we need to understand
the techniques and algorithms that hide the secret message.
For forensic investigators, retrieving the secrecy of the data is
challenging and depends on the availability of the information
to the investigators. There are several techniques used to
hide information in images, including the least significant bit,
Transform Domain, and Masking and Filtering techniques [6].
Fig. 1. General Techniques Applied in Image Steganography [?].
1) LSB Technique: In image steganography, the first tech-
nique is called the least significant bit (LSB) and defined as
the substitution of single LSB with the bit pattern, so the bits
are embedded in the image’s data, which are called pixels.
These changes are likely to be invisible to the human visual
system (HVS). The embedded algorithm of LSB steganog-
raphy is based on the following formula: Yi = 2|x1
2 | + mi,
where mi is the i-th message bit, xi is the i-th selected
pixel value before embedding, and yi is the i-th selected
pixel value after embedding. Let Px(x = 0), Px(x = 1) refers
to the distribution of the least significant bits of the cover
image, and Pm(m = 0), Pm(m = 1) refer to the distribution
of the secret binary message bits. To keep the secrecy of
the message, we encrypt the message before embedding, as
the average of the distribution message which is equal to
Pm(m = 0) ∼= Pm(m = 1) ∼= 1
2 . Also, the cover image and
the message will be calculated independently by using this
equation:
P+1 =
P
2
Px(x = 0), P0 = 1 −
P
2
, P−1 =
P
2
Px(x = 1) (1)
Where P is the embedding rate, measured in bits per pixel
(bpp). When applying this embedding technique, it is possible
to elicit the embedded message from the selected pixels in the
LSBs technique [7].
2) Transform Domain Technique: Transform technique,
also called frequency technique, embeds the message by
modifying coefficients to perform transformation domain
technique. Several algorithms are used with these techniques
in image steganography, and it is designed to transfer images
to its frequency domain. This section will discuss the most
widely used algorithms, Discrete Cosine Transform (DCT)
and Discrete Wavelet Transform (DWT).
Discrete Cosine Transform (DCT), the primary role of the
Discrete Cosine Transform (DCT) is to convert the pixels in
image representation into a frequency of 8 X 8 pixels blocks
and transform these pixels blocks into 64 DCT. The Inverse
Discrete Cosine Transform (IDCT) is applied to the 8 X 8
DCT coefficient blocks. The bottom algorithms are how we
can apply DCT n image steganography. To implant a secret
text message within an image, the following algorithm is used:
1) Study cover image.
2) Study secret message and transform the message in
binary form.
3) The cover image is divided into 8x8 blocks of pixels.
4) Operating from left to right and top to bottom for
subtracting 128 in each block of a pixel.
5) DCT is performed on each block of the pixel.
6) Compressing each block by using the quantization table.
7) Compute LSB of each DC coefficient and swap with
each bit of secret message.
8) Create stego image.
9) Evaluate the Peak Signal to Noise Ratio (PSNR), Mean
Square Error (MSE) of the stego image.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
55 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. To regain a secret text message, the computer forensic inves-
tigator can perform the following steps:
1) Study of stego image.
2) Stego image is divide into 8x8 blocks of pixels.
3) Functioning from left to right, top to bottom subtracts
128 in each block of pixels.
4) DCT is performed on each block.
5) Compressing each block by using the quantization table.
6) Analyse LSB of each DC coefficient.
7) Get back and translate each 8 bit into character [8].
Discrete Wavelet Transform (DWT), DWT is a mathemat-
ical function, which can transform the partitions which have
the high-frequency and low-frequency information on a pixel
by pixel. It is preferred than DCT because it can deal with
different levels of the image. In DWT image steganography
can be applied using the following algorithm: The criminal can
implant a secret text message by using the following algorithm:
1) Study the cover image and secret text message, which
is to be concealed in the cover image.
2) Transform the secret text message into binary. 2D-Haar
transform performs on the cover image.
3) Find coefficients’ filtering of the cover image in the
horizontal and vertical direction. Attach cover image
with data bits for DWT coefficients.
4) Get the target image.
5) Determine the stego image by calculating the Mean
Square Error (MSE) and Peak Signal to Noise Ratio
(PSNR).
To facilitate the process to regain a secret text message for the
investigators, they can use the following algorithm:
1) Study the stego image.
2) Find out the horizontal and vertical filtering coefficients
of the cover image. Retrieve the secret message bit by
bit and recompose the cover image.
3) Translate data into the message vector. Differentiate it
with the original message [8].
3) Masking and Filtering Technique: Masking and Filtering
techniques are based on image analysis and marking an image,
which hides the information to make a watermarking. Making
a watermark can be done by modifying the luminance of
parts of the picture. It makes the changes in visible properties
of images, but the criminal will follow some algorithm to
make this changes invisible to the human eyes. The criminals
need to search for significant areas to embed the data in
this area. After that, they will look for the integral parts of
the cover image to integrate the secret data by using some
mathematical expressions to select the pixels. Usually, this
method is restricted to a 24-bit image. Image processing, such
as compression and cropping, is more potent in masking and
filtering than in LSB modification because it is adequate to
use a compression algorithm in JPEG [9].
V. AUDIO STEGANOGRAPHY
The widespread of audio signals presence as information
vectors has resulted to the importance of using audio files
in hiding data. Most steganalysis efforts intense into digital
images leaving audio steganalysis relatively unexplored. Al-
though the audio files are eligible to carry hidden information
because of their availability and popularity, using audio files
for data hiding is especially challenging because of the sen-
sitivity of the human auditory system (HAS). HAS still allow
for common alterations in small differential ranges. More-
over, listeners, in most cases, would ignore some common
environmental distortions. Criminals utilize these audio signals
properties in carrying hidden data [10].
A. Audio Steganography Techniques
Generally, concealing information progress rely on two
steps. Firstly, selecting the redundant bits in the sound file.
Secondly, include confidential data by replacing these extra
bits with the message bits. In this section, we will focus on
three techniques of audio steganography: ”Phase Encoding,
Spread Spectrum, and Echo Data Hiding.” Other methods,
LSB Coding and Parity Coding that were discussed in image
steganography, can also be used in audio steganography.
1) Phase Encoding Technique: Sound phase components
are not sensitive to the human ear as clutter. On that fact, Phase
coding is dependable. This complex with a low data transfer
rate method depends on choosing the phase ingredients within
the original speech spectrum and then replacing the elements
with the data to be hidden. The subsequent parts stage is then
adjusted. This adjusting purpose is to maintain the relative
phase between the segments. This method, compared to other
data masking techniques, is resistant to signal distortion [11],
[12]. The authors in [13] applied multi-band phase modulation
to add data into phase ingredients. These inaudible phase
modifications obtained by modifying phase ingredients in the
cover sound and should remain small to ensure a hearing loss.
The quantitative index modulation (QIM) method is used on
phase components. Based on replacing the phase value by the
nearest x point (to hide bit 1) or the nearest o point (to hide
bit 0) in the unit circuit as figure 2. To include one bit in the
phase sequence, segmental patterns are defined to represent
the value of bit 1 and the value of bit 0. For example, for
a sequence of 4 coefficient, we can specify the model A: (x
oxo), and type B: (0 xox) to represent bit I. 0. To hide a bit,
we need to modify 8 to comply with pattern A or B [11].
2) Spread Spectrum Technique: This technique resembles
the LSB technique, which spreads the message bits randomly
over the entire audio file. But Spread Spectrum Technique tries
to spread the encrypted data over the available frequencies
as much as possible. It propagates the message along the
frequency spectrum of the audio file. The spread spectrum
method uses a symbol that is not based on the original signal.
This method allows the reception of the signal even if there
is interference on some frequencies. It provides a moderate
data transfer rate while maintaining a high level of durability
but exposing noise in an audio file. The propagation spectrum
consists of two types: frequency hopping propagation spectrum
and direct spread spectrum expansion. The concealment of
audio information can be used in both cases. In the case of
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
56 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. Fig. 2. Phase Encoding Technique [11]
frequency hopping, the frequency spectrum of the audio signal
can be changed to quickly jump between frequencies [15]. The
direct sequence spread spectrum (DSSS) propagates a secret
signal by multiplying it with the slide and then modifying the
message with a false random signal that resembles the cover
sound. MP3 and WAV signals are used to hide confidential
information in the DSSS method [11]. Criminals exploit the
advantages of spread spectrum technique that provides better
durability. Consequently, using SS algorithms to hide audio
evidence caused broad concern that leads investigators to
take action according to detect the hidden spread spectrum
effectively and verifying the reliability of the secret signal
existing [14].
3) Echo Hiding Technique: The data is hidden by en-
tering the echo of the original signal and then changing
three variables of the echo: initial amplitude, decay rate, and
displacement. If only one echo is produced from the original
signal, only one piece of information can be encoded. Human
perception is exploited by inserting echo to parts of the audio
signal cover. All variables must take their values under the
hearing threshold of the human ear so that no echo is detected.
The parameter offset is varied and represents the message to
be encoded. The offset value is binary zero, while the other
offset value is binary. The original signal is decomposed into
blocks before the encoding proceedings start. Then, segments
are combined when the coding process is stopped. Thus, the
final signal is obtained [11]. This technique has features that
make the ability to detect the additional data existence by HAS
not easy — drawback: less secure method and low capacity
of embedding [15].
VI. VIDEO STEGANOGRAPHY
This is a technique in which digital video format is used
to hide data. A video file that collects different image frames
is used as the carrier to cover the data. Generally, discrete
cosine transformation (DCT) is used because human eyes do
not understand it. Different types of formats used in video
steganography include H.264, Mp4, MPEG, AVI. The basic
block diagram is given in Figure 3.
Necessary steps performed in the video steganography are
as follows:
Fig. 3. Basic Block Diagram for Video Steganography [16].
1) Select a particular video in which we want to embed the
data.
2) Divide the video into small frames.
3) Choose a particular structure in which we wish to our
secret data to be inserted.
4) The secret key is positioned for embedding with that
specific frame, and then the stego video is sent to the
sender.
The reverse of this process is performed for the extraction
of the video. By selecting a particular frame with a secret
key in the extracting block, we can generate our video for
the extraction [17]. there is several techniques and their
combinations used in the video steganography, see Figure 4,
we will focus on three of them.
Fig. 4. Types of Video Steganography [17].
A. Video Steganography Techniques
1) Substitution Based Technique: Secret data are combined
with redundant cover data in these strategies. The Least Signif-
icant Bit (LSB) method, Bit Plane Complexity Segmentation
(BPCS), Triway Pixel Value Differentiation (TPVD), etc. [18]
are various types of substitution-based techniques. LSB is the
newest strategy focused on the replacement. This operates by
swapping certain pixel LSBs from the cover image with the
secret message bits [18]. This system offers high potential
for embedding but is vulnerable to attacks. BPCS (Bit Plane
Complexity Segmentation) is used to separate an image/frame
into planes of parts through binary digits. It takes all pieces
of a prominent location and produces a portion of a plane.
In the bit planes, the intensity of each area is determined
after the picture is decomposed into bit planes. The hidden
data then substitute the noise-like regions to reduce output
degradation [18]. TPVD (Tri-way Pixel Value Differentiation
Method) offers further hiding power by integrating secret data
in lateral, vertical, and diagonal edges. This is a revised PVD
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
57 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. (Pixel Value Differentiation Method) version in which the
adjacent pixel difference value hides secret data. There are
three types of differential values: lower limits, higher limits,
and widths. To insert data into compressed MPEG images,
Sherly et al. in [19] uses TPVD.
2) Transform Domain Technique: The main drawback to
techniques based on substitution is that these techniques are
not capable of addressing any modification in the source of
the cover, which involves compression, format change, etc.
and an attacker can quickly destroy the embedded data using
these techniques. Transform domain techniques are therefore
applied, providing more robustness and perceptual clarity to
the stego-objects produced. In these methods, hidden data
is stored through transformed coefficients, and the changed
coefficients are translated back to the original shape of the
sheet. For example, Discrete Fourier Transformation (DFT),
Discrete Cosine Transform (DCT) and Discrete Wavelet Trans-
form (DWT). All these processes are used for image and video
compression methods. The significant advantage of DWT is
a quick resolution. In other words, it gathers frequency and
position data [18]. They are using 8X8 block DCT in DCT
to transform secret message and video frame coverage. Using
multidimensional lattices, the hidden message coefficients are
quantified and encoded and then integrated into the DCT
coefficients of the cover frame [17].
3) Adaptive Technique: Also known as ”Masking” or
”Statistics-conscious embedding,” operate on the cover’s nu-
merical features until modifying the secret data. This helps
to identify the most active regions identified as Resource
Regions (ROI) where secret data can be stored. Then, the
cover is modified in compliance with certain requirements in
this phase, and then classified data is contained in it. Various
attributes can be used in video streams to build adaptive
techniques [18].
VII. TEXT STEGANOGRAPHY
This section demonstrates one of the steganography meth-
ods, which is the text steganography. This method is consid-
ered one of the oldest techniques in steganography as well as
the most difficult one, for the reason of the lack of redundant
information in a text file. In executing steganography, the pri-
mary purpose is to hide the undercover info media. Therefore,
the outsiders may not notice the information contained in
the said frame where this reflects the significant difference
among steganography and other methods of hidden exchange
of information. This part explains text steganography in detail.
Since it emphasizes on masking secret messages inside a
cover medium, the most vital property of cover medium is
that the quantity of knowledge that may be kept within it
while not ever-changing its remarkable features. There are
several techniques with which to hide, analyze, and recover
that hidden information. Because of the variations between
languages, no single process is used for activity data in texts of
various styles. In the following section, some of the techniques
are mentioned briefly [20].
A. Text Steganography Techniques
Nowadays, computer systems have simplified hiding in-
formation in texts. Consequently, the range of using hidden
information in the text has also developed. Text steganography
is broadly classified into three types- format-based, random,
and applied math generations and Linguistic methodology.
1) Format-based Technique: It is used to alter the format
of the cover-text to cover knowledge. They are not doing any
modification to word or sentence. It typically modifies the
present text to cover the stenographic text. A format-based
text steganography method is an open space method [20].
Examples of such technique are line shifting and word shifting.
In line shifting technique, the length of every code word which
will be hidden is reduced, the examination of the method that
shifted each line; however, the amount will still be massive.
As an instance, having a page with forty lines, that’s 220 =
one, 048, 576 distinct code words per page, see Figure 5.
In word shifting technique, the information is hidden by
shifting the words horizontally or by changing the distance
between the words, see Figure 6.
Fig. 5. Line shifting technique [20].
Fig. 6. An Example of Word Shifting Technique [21].
2) Linguistic methods: The linguistic method considers the
linguistic properties of the text to modify it. The technique
uses the linguistic structure of the message as a place to hide
information. It is complicated with creating changes to a cover
text to plant data in such a way that the changes don’t lead
to ungrammatical or unnatural text. The syntactic method and
semantic method are types of linguistic steganography. Fre-
quently used linguistic designs as an area for privet messages.
In truth, steganography proficiency will be hidden inside the
syntactical structure itself [21].
Lexical Steganography, this technique uses certain words
from the text, which are selected, then their synonyms are
identified. After that, the terms along with their synonyms are
used to hide the secret message in the text, and the alternative
of the word to be chosen from the list of synonyms would
rely on secret bits; it used synonym replacement by using a
synonym. Huffman Compression first compresses the privet
text to be secreted. In [22], Brecht Wyseur, Karel Wouters,
and Bart Prenee proposed linguistic steganography based on
word substitution over an IRC channel. The generation of the
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
58 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. Fig. 7. Syntactic Rules [23].
word substitution table is based on a session key and used
synonyms from a public thesaurus.
Syntactic Steganography, in this method, the use of the
word context-free grammars (CFG) is widespread. It is a tree
structure that may be used for concealing the bits wherever
the left branch represents ’0’ and right branch corresponds to
’1’. However, this method is less advantageous to use. It is
so maybe because the small rules that cause the text to repeat
themselves a great deal and also the text are unflawed, hence,
leading to a scarcity of linguistics structure [23], Figure 7
shows an example of syntactic rules.
VIII. DETECTION STEGANOGRAPHY
To improve computer forensic, investigators need to follow
some techniques to reveal the secret message. In this section,
we will describe how the investigators can detect this embed-
ded message in each type of steganography.
A. Detection Techniques for Image Steganography
Basically, the investigator can detect the secret message
in image steganography by decompressing the JPEG stego
image. For all stenographic techniques, there is no accurate
recipe to find the secret message, but in this section, we will
provide general methods the investigators can use. In computer
forensic, the investigator analyzes the length of the embedded
secret message to predict the changes. For JPEG images, it
may be possible to have a picture with macroscopic properties
from the stego image that is similar to the cover JPEG image.
By decompressing the stego image to 4 pixels through the
use of the quantization table, the investigator could get the
microscopic properties [24]. In this section, we will describe
two detection algorithms F5 and OutGuess.
1) F5 Algorithm: This algorithm uses subtraction or matrix
format technique to predict the length of the embedded secret
message. This algorithm is the most accurate one to find the
length. The central concept that the investigator can do in this
algorithm is to replace the least significant bit (LSB) of the
DCT coefficient by using the following algorithm [24].
2) OutGuess Algorithm: The outGuess algorithm is de-
signed by Provos to counter the statistical Chi-square attack.
It shows that the investigator can detect the stego image by
using a pseudo-random number generator. Also, it depends on
replacing the least significant bit (LSB) of the DCT coeffi-
cient. OutGuess selects the histogram of the DCT coefficient
randomly to match the cover and stego histogram. Following
the next algorithm will allow the investigator to detect the
stego image [24], see Figure 9.
Fig. 8. F5 Algorithm [24].
Fig. 9. OutGuess Algorithm [24].
B. Detection Techniques for Audio Steganography
Audio forensics analysis is a complex science. The im-
plementation of audio forensic has led to a successful case
investigation. Available audio tampering on markets makes
the authenticity of audio file detection vital, which in turn
results in the critical role of audio forensics crime investigating
and exposure. Detecting mechanism of the hidden information
existing in audio files refers to Steganalysis. The Electronic
Network Frequency (ENF) is one of the recordings of forensic
analysis methods. It relies on the traces of the ENF existing
in the record [25]. Based on the way phase coding method
works by substituting the phase of a first audio segment
with a reference data phase to be hidden, which adjudicates
the alteration of phase difference because of the extrinsic
continuities corruption of unwrapped phase in each section.
Therefore, each segment has a different statistical analysis and
can be used in monitoring the change, classify the embedded
signal, and clean signal. De facto Phase steganalysis is one of
the most challenging in computer forensics fields. However,
investigators can implement phase steganalysis by dividing
each audio signal into segments with a given length and
then perform the following steps. First, they use Fast Fourier
Transform (FFT) that allows viewing the spectrum content of
an audio signal of a particular segment to drive the phase
differential spectra from unwrapped phases of each audio
sample. Second, five statistical characteristics of the phase
difference for steganalysis are derived. These characteristics
are essential because they compress each spectrum informa-
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
59 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. tion and monitor the change of phase difference: variance,
skewness, kurtosis, median, and mean absolute deviation.
Finally, they can utilize the support vector machine SVM
classifier for classification [26]. Considering that the Spread
Spectrum technique is an adding noise process, detection can
be achieved using vector extraction and classifier technology
in the computer forensics field. According to [27], wavelength
analysis is used to separate the audio signal into several frames
and obtain detailed information to extract feature vectors.
Initially, the threshold value is determined by compressing
the signal wavelength coefficient to eliminate interference and
then obtain de-noise by the wavelet coefficient to reconstruct
the signal. In each frame, the mean difference between signal
with and without de-noising composite the feature vectors.
Finally, as in the phase decoding algorithm, classify the Signal
Attribute using SVM based on the audio signal feature vectors.
Investigators in the field of computer forensic can benefit
from the proposed algorithm by the authors in [28] that are
based on extracting a short window from the audio signal
and calculating the moments of high-frequency peak center
using the support vector machine. Then, they analyze the
statistics of the peak frequencies [29]. In [28], the proposed
steganalysis algorithm is designed for a typical echo coding
algorithm. Taking advantage of the features of this echo hiding
technology, which hides information in the host audio without
any unique key, so that anyone can discover the message
included in the audio signal.
C. Detection Techniques for Video Steganography
D. Video Detection Exploring the Temporal Correlation be-
tween Frames
Budia et al. in [30] suggests a visual steganalysis strat-
egy using the redundant knowledge existing in the tempo-
ral domain as a barrier to secret messages found in the
steganography of the distributed spectrum. Based on linear
collaboration methods, their analysis is useful in finding,
with good precision, secret watermarks with low energy. The
simulation findings further show the supremacy of the time-
based approaches in finding the hidden message over strictly
spatial methods [18].
E. Video Detection based on Spatial and Temporal Prediction
For the MPEG video coding standard, Pankajakshan and
Ho suggest a video steganalysis scheme [31] in which a
given frame is predicted using motion compensation from
its neighboring reference frames. The MPEG coding scheme
supports two types of predicted structures: the P-frames (the
reference frame uses a single past frame) and the B-frames
(using past frames and future frames as frames of reference).
The probability error frames (PEFs) referring to the P and B-
frames will then be coded using the techniques of transform
coding. The PEFs display spatiotemporal similarity between
the frames next to them. Using the 3-level DWT (Discrete
Wavelet Transform) process, the PEFs of a test video signal
is decomposed, and the first three moments of characteristic
functions (CFs) are measured in each sub-band. The resulting
attribute vectors are fed to train a classifier of patterns to
differentiate between stego and non-stego images [32].
F. Detection Techniques for Text Steganography
When covering and changing techniques in the text to hide
some classified information or make the entire text confiden-
tial, these methods make some attackers analyze the text or
use some linguistic and semantic steganography to discover
the original text using text-stego to detect the computer crime.
Steganalysis is to analyze stego-text to detect or extract secret
messages [23]. Therefore, algorithms must be chosen that are
difficult to interpret or detect and which cannot be known
if the aggressors have altered them. Usually, steganalysis
sends out messages that are worthless or of importance to
solicit, discover as much information as possible, and discover
changes to them. Steganalysis is generally considered to be
successful when the existence of a message is detected [33].
In this section, we will mention the method of detection
algorithms based on font formatting. First, we will compile
the texts to see the original text from the text that we changed,
and We can use finding a vector machine, which has the
outstanding performance of classification [34], [35], as the
classifier. SVM has been extensively used, and it has delivered
a state-of-the-art performance in steganalysis of image and
video [36]. We will make SVM categorized for each font
feature. Note that they are two groups, plain text, and stego
text.
General Steganalysis rule for text steganography sup-
ported font format Algorithm.
Input: Font attributes and the corresponding classifiers.
Output: The designations of attributes that contain information
and the total unseen information length.
1) Initialize the unseen information length cj = 0 and
marker variable Tj = False(0 ≤ j < m);
2) Traverse each font attribute of all characters in the text,
and extract values of separately m font attributes;
3) For each attribute, create the characteristic vector ac-
cording to the values;
4) For each non-empty characteristic vector, use the trained
classifier Mj(0 ≤ j < m) to identify whether there
is embedded information or not. If unseen information
was found, set Tj = True and estimate the unseen
information length jc for attribute j;
5) If Tj = True, output the name of attribute j and the
value of jc, and compute the over-all unseen information
length.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
60 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
8. IX. CONCLUSION
Steganography is used to hide confidential data in cover
media. Thus, the hidden data is resistant to external attacks
and does not express the possibility of contact between the
two parties. Several types of cover source can be used such
as image, audio, video and text. The main objective of this
paper is to identify various techniques that are reliable and
have the capability improvement with a minimal loss in stego
file quality. In this paper, we have provided the whole picture
of steganography. We have explained several techniques for
each steganography type. For computer forensic investigation,
digital steganalysis is very useful. Thus, we have investigated
the function of steganalysis.
REFERENCES
[1] Hasan, Raza, Salman Mahmood, and Akshyadeep Raghav. ”Overview
of Computer Forensics tools.” Proceedings of 2012 UKACC International
Conference on Control. IEEE, 2012.
[2] Sarage, Govind Namedorao. ”Study of Various Techniques of Steganog-
raphy and Steganalysis.” International Journal of Advanced Research in
Computer Science 5.6 (2014).
[3] ´Cosi´c, Jasmin, and Miroslav Baˇca. ”STEGANOGRAPHY AND ITS
IMPLICATION OF FORENSIC INVESTIGATION.” Infoteh 2010. 2010.
[4] Hariri, Mehdi, Ronak Karimi, and Masoud Nosrati. ”An introduction to
steganography methods.” World Applied Programming 1.3 (2011): 191-
195.
[5] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. ”An overview of
image steganography.” ISSA. 2005.
[6] Yari, Imrana Abdullahi, and Shahrzad Zargari. ”An overview and com-
puter forensic challenges in image steganography.” 2017 IEEE International
Conference on Internet of Things (iThings) and IEEE Green Computing
and Communications (GreenCom) and IEEE Cyber, Physical and Social
Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2017.
[7] Hamid, Nagham, et al. ”Image steganography techniques: an overview.”
International Journal of Computer Science and Security (IJCSS) 6.3 (2012):
168-187.
[8] Sharma, Sudhanshi, and Umesh Kumar. ”Review of Transform Domain
Techniques for Image Steganography.” International Journal of Science and
Research 2.2 (2015): 1.
[9] Amin, Muhalim Mohamed, et al. ”Information hiding using steganogra-
phy.” 4th National Conference of Telecommunication Technology, 2003.
NCTT 2003 Proceedings.. IEEE, 2003.
[10] Djebbar, Fatiha, et al. ”Comparative study of digital audio steganography
techniques.” EURASIP Journal on Audio, Speech, and Music Processing
2012.1 (2012): 25.
[11] Djebbar, Fatiha, et al. ”A view on latest audio steganography tech-
niques.” 2011 International Conference on Innovations in Information
Technology. IEEE, 2011.
[12] Kekre, H. B., et al. ”Information hiding in audio signals.” International
Journal of Computer Applications 7.9 (2010): 14-19.
[13] Gang, Litao, Ali N. Akansu, and Mahalingam Ramkumar. ”MP3 re-
sistant oblivious steganography.” 2001 IEEE International Conference
on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.
01CH37221). Vol. 3. IEEE, 2001.
[14] Zeng, Wei, Ruimin Hu, and Haojun Ai. ”Audio steganalysis of spread
spectrum information hiding based on statistical moment and distance
metric.” Multimedia Tools and Applications 55.3 (2011): 525-556.
[15] Tanwar, Rohit, and Monika Bisla. ”Audio steganography.” 2014 Interna-
tional Conference on Reliability Optimization and Information Technology
(ICROIT). IEEE, 2014.
[16] Bodhak, V., and L. Gunjal. ”Improved protection in video Steganography
using DCT & LSB” international journal of engineering and innovative
technology (IJEIT) vol. 1, issue 4.” (2012).
[17] Sadek, Mennatallah M., Amal S. Khalifa, and Mostafa GM Mostafa.
”Video steganography: a comprehensive review.” Multimedia tools and
applications 74.17 (2015): 7063-7094.
[18] Thakur, Abhinav, Harbinder Singh, and Shikha Sharda. ”Different
Techniques of Image and Video Steganography: A Review.” International
Journal of Electronics and Electrical Engineering 2.
[19] Sherly, A. P., and P. P. Amritha. ”A compressed video steganography
using TPVD.” International Journal of Database Management Systems
(IJDMS) 2.3 (2010): 67-80.
[20] Bender, Walter, et al. ”Techniques for data hiding.” IBM systems journal
35.3.4 (1996): 313-336.
[21] Niimi, Michiharu, et al. ”A framework of text-based steganography using
sd-form semantics model.” Pacific Rim Workshop on Digital Steganogra-
phy 2003. 2003.
[22] Wai, Ei Nyein Chan, and May Aye Khine. ”Syntactic bank-based
linguistic steganography approach.” 2011 International Conference on
Information Communication and Management IPCSIT. Vol. 16. 2011.
[23] Bennett, Krista. ”Linguistic steganography: Survey, analysis, and robust-
ness concerns for hiding information in text.” (2004).
[24] Sujatha, V. ”Empirical analysis on steganography using JSteg, Outguess
0.1 and F5 algorithms.” IJARCA 3.1 (2015): 20-28.
[25] Zakariah, Mohammed, Muhammad Khurram Khan, and Hafiz Malik.
”Digital multimedia audio forensics: past, present and future.” Multimedia
tools and applications 77.1 (2018): 1009-1040.
[26] Zeng, Wei, Haojun Ai, and Ruimin Hu. ”A novel steganalysis algorithm
of phase coding in audio signal.” Sixth International Conference on
Advanced Language Processing and Web Information Technology (ALPIT
2007). IEEE, 2007.
[27] Gao, S., et al. ”A detection algorithm of audio spread spectrum data
hiding.” 2008 4th International Conference on Wireless Communications,
Networking and Mobile Computing. IEEE, 2008.
[28] Zeng, Wei, Haojun Ai, and Ruimin Hu. ”An algorithm of echo steganaly-
sis based on power cepstrum and pattern classification.” 2008 International
Conference on Audio, Language and Image Processing. IEEE, 2008.
[29] Meghanathan, Natarajan, and Lopamudra Nayak. ”Steganalysis algo-
rithms for detecting the hidden information in image, audio and video
cover media.” international journal of Network Security & Its application
(IJNSA) 2.1 (2010): 43-55.
[30] Budhia, Udit, Deepa Kundur, and Takis Zourntos. ”Digital video ste-
ganalysis exploiting statistical visibility in the temporal domain.” IEEE
Transactions on Information Forensics and Security 1.4 (2006): 502-516.
[31] Pankajakshan, Vinod, and Anthony TS Ho. ”Improving video ste-
ganalysis using temporal correlation.” Third International Conference on
Intelligent Information Hiding and Multimedia Signal Processing (IIH-
MSP 2007). Vol. 1. IEEE, 2007.
[32] Wang, Yao, J¨orn Ostermann, and Ya-Qin Zhang. ”Video processing and
communications.” Progressive 1 (2002): 12.
[33] Petitcolas, Fabien AP, Ross J. Anderson, and Markus G.
Kuhn.”Information hiding-a survey.” Proceedings of the IEEE 87.7
(1999): 1062-1078.
[34] Vapnik, Vladimir, and Vlamimir Vapnik. ”Statistical learning theory.”
(1998).
[35] Cortes, Corinna, and Vladimir Vapnik. ”Support-vector networks.” Ma-
chine learning 20.3 (1995): 273-297.
[36] Ozer, Hamza, et al. ”Steganalysis of audio based on audio quality
metrics.” Security and Watermarking of Multimedia Contents V. Vol. 5020.
International Society for Optics and Photonics, 2003.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 5, May 2020
61 https://sites.google.com/site/ijcsis/
ISSN 1947-5500