CFP last date
20 December 2024
Reseach Article

Review of the Literature on the Steganography Concept

by Fatih Şahin, Taner Çevik, Mustafa Takaoğlu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 2
Year of Publication: 2021
Authors: Fatih Şahin, Taner Çevik, Mustafa Takaoğlu
10.5120/ijca2021921298

Fatih Şahin, Taner Çevik, Mustafa Takaoğlu . Review of the Literature on the Steganography Concept. International Journal of Computer Applications. 183, 2 ( May 2021), 38-46. DOI=10.5120/ijca2021921298

@article{ 10.5120/ijca2021921298,
author = { Fatih Şahin, Taner Çevik, Mustafa Takaoğlu },
title = { Review of the Literature on the Steganography Concept },
journal = { International Journal of Computer Applications },
issue_date = { May 2021 },
volume = { 183 },
number = { 2 },
month = { May },
year = { 2021 },
issn = { 0975-8887 },
pages = { 38-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number2/31903-2021921298/ },
doi = { 10.5120/ijca2021921298 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:15:42.628602+05:30
%A Fatih Şahin
%A Taner Çevik
%A Mustafa Takaoğlu
%T Review of the Literature on the Steganography Concept
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 2
%P 38-46
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information hiding is a subject of study from past to present. Information hiding processes, called steganography, have been the focus of interest since the beginning of history because they are strategically interested in valuable information. In our study, the applications of Steganography with different fields from basic and primitive applications to today's technological applications have been studied. Image Steganography, Video Steganography, Audible Steganography, Text Steganography, Protocol Steganography were examined. Steganography techniques were examined under two headings. Protocol Steganography and Discrete Fourier Transform Technique, Discrete Cosine Transform Technique and Discrete Wavelet Transform Technique are examined. Spatial Domain Methods and Least Important Bits, Optimal Pixel Adjustment Procedure, Pixel Value Difference, Edge Based Data Embedding Method were examined.

References
  1. L. M. Marvel, C. G. Boncelet, and C. T. Retter, "Spread spectrum image steganography," in IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, Aug. 1999.
  2. M. Kumar, and A. Rani, "A Short Survey on Steganography", International Journal of Computer Science and Technology, 4(1), 181-185, 2013.
  3. Internet: J. Silman, Steganography and Steganalysis: An Overview, SANS Institute, https://www.sans.org/reading-room/whitepapers/stenganography/steganography-steganalysis-overview-553, 16.12.2001.
  4. T. Jamil, “Steganography: The art of hiding information is plain sight”, in IEEE Potentials, 18(01), 192-194, 1999.
  5. R. Doshi, P. Jain, and L. Gupta, "Steganography and Its Applications in Security." International Journal of Modern Engineering Research (IJMER) 2(6), 4634-4638, 2012.
  6. D. C. Wu, and W. H. Tsai, "A steganographic method for images by pixel-value differencing." Pattern Recognition Letters, 24(2003), 1613–1626, 2003.
  7. V. O. Waziri, A. Isah, A. Ochoche, and S. M. Abulhamid, "Steganography and Its Applications in Information Dessimilation on the Web Using Images as Security Embeddment: A Wavelet Approach." International Journal of Computer and Information Technology, 1(2), 194-202, 2012.
  8. S. Naskar, A. S. Gayen, and S. K. Bandyopadhyay, "Text Steganography an Approach." Journal for Research, J4R, 4(6), 1-4, 2018.
  9. S. A. Laskar, and K. Hemachandran, "Steganography Based on Random Pixel Selection for Efficient Data Hiding." International Journal of Computer Engineering and Technology (IJCET), 4(2), 31-44, 2013.
  10. S. Y. Shen, and L. H. Huang, "A data hiding scheme using pixel value differencing and improving exploiting modification directions." ELSEVIER, ScienceDirect, Computers & Security, 48, 131-141, 2015.
  11. N. Singh, "Survey Paper on Steganography." International Refereed Journal of Engineering and Science (IRJES), 6(1), 68-71, 2017.
  12. D. Kieu, and C. C. Chang, "A steganographic scheme by fully exploiting modification directions." ELSEVIER, ScienceDirect, Expert Systems with Applications, 38(2011), 10648-10657, 2011.
  13. F. Kabudvand, "New Methods for Text Steganography." International Journal of Scientific Research in Science, Engineering and Technology, IJSRSET. 1(5), 383-385, 2015.
  14. P. Chandarana, and P. Ahirao, "Advanced Image Steganography." International Journal of Innovative Research in Information Security (IJIRIS), 7(5), 471-474, 2018.
  15. Internet: T. Morkel, J. H. P. Eloff, and M. S. Olivier, "An overview of image steganography." Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, South Africa, http://repository.root-me.org/St%C3%A9ganographie/EN%20-%20Image%20Steganography%20Overview.pdf, 01.06.2005.
  16. D. H. Jagadeesha, Y. Manjula, and M. Z. Kurian, "FPGA Implementation of X-Box Mapping for an Image Steganography Tecghnique." International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, IJAREEIE, 2(6), 2548-2554, 2013.
  17. A. Kumar, and K. Pooja, "Steganography- A Data Hiding Technique." International Journal of Computer Applications, 9(7), 19-23, 2010.
  18. T. Vyas, and A. Sharma, “Survey Paper on Steganography." International Journal of Engineering Sciences & Research Technology, IJESRT, 5(12), 706-708, 2016.
  19. B. Chandel, and S. Jain, "Video Steganography: A Survey." IOSR Journal of Computer Engineering (IOSR-JCE), 18(1), 11-17, 2016.
  20. A. A. Chincholkar, and D. A. Urkude “Design and Implementation of Image Steganography." Journal of Signal and Image Processing, 3(3), 111-113, 2012.
  21. S. Natanj, and S. R. Taghizadeh, "Current Steganography Approaches: A survey." International Journal of Advanced Research in Computer Science and Software Engineering, IJARCSSE, 1(1), 1-8, 2011.
  22. N. Singh, and V. K. Yadav, "Trends in Digital Video Steganography: A Survey." International Journal of Computer Applications, 169(7), 6-18, 2017.
  23. S. Singh, P. Singh, R. Garg, and P. K. Mishra, "Some Observations of Image Steganography on Implementation of Least Significant Bit Technique with Mapping Method." International Journal of Advanced Research in IT and Engineering, IJARIE, 2(2), 97-105, 2013.
  24. N. Singh, "Survey Paper on Steganography." International Refereed Journal of Engineering and Science (IRJES), 6(1), 68-71, 2017.
  25. R. M. Kirandeep, "A Comparitive Analysis of Steganography Techniques." The International Journal of Engineering and Science (IJES), 5(4), 67-70, 2016.
  26. M. I. S. Reddy, M. P. Reddy, and K. S. Reddy, "Different Medias of Steganography- An Emerging Field of Network Security." International Journal of Computer Science and Information Technologies, (IJCSIT), 3(2), 3517-3522, 2012.
  27. C. P. Sumathi, T. Santanam, and G. Umamaheswari, "A Study of Various Steganographic Techniques Used for Information Hiding." International Journal of Computer Science & Engineering Survey (IJCSES), 4(6), 9-25, 2013.
  28. J. Surana, A. Sonsale, B. Joshi, D. Sharma, and N. Choudhary, "Steganography Techniques." International Journal of Engineering Development and Research, IJEDR, 5(2), 989-992, 2017.
  29. V. Rabara, and A. Goswami, "A Survey of Image Based Steganography." International Journal of Computer Engineering and Sciences (IJCES), 1(2), 1-4, 2015.
  30. Z. Al-Omari, and A. T. Al-Taani, "A Survey on Digital Image Steganography." 7th International Conference on Information Technology (ICIT), pp.109-115, 2015.
  31. H. C. Wu, N. I. Wu, C. S. Tsai, M. S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods." IEE Proc.-Vis. Image Signal Process, 152(5), 611-615, 2005.
  32. M. Hussain, and M. Hussain, "A Survey of Image Steganography Techniques." International Journal of Advanced Science and Technology, 54(1), 113-124, 2013.
  33. Internet: B. Sharonyah, "Image steganography." Faculty of Information Technology University of Moratuwa Sri Lanka, https://www.coursehero.com/file/38840672/Computer-Science-114128Ppdf/, 2019.
  34. S. Kaur, A. Kaur, and K. Singh, "A Survey of Image Steganography." International Journal of Computer Applications Technology and Research, 3(7), 479-483, 2014.
  35. R. Bhuvanya, K. Vijayalakshmi, S. Uma, and A. Suresh, "Secret data sharing using steganography and image processing." International Journal of Engineering & Technology, 7(1.7), 100-104, 2018.
  36. B. Chandel, and S. Jain, "Video Steganography: A Survey." IOSR Journal of Computer Engineering (IOSR-JCE), 18(1), 11-17, 2016.
  37. Rakhi and S. Gawande, "A Review on Steganography Methods." International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, IJAREEIE, 2(10), 4635-4638, 2013.
  38. N. Kaur, and S. Behal, "Audio Steganography Techniques-A Survey." International Journal of Engineering Research and Applications, IJERA, 4(6), 94-100, 2014.
  39. A. Koyun, and H. B. Macit, "Generating a stego-audio data using LSB technique and robustness test." Journal of Engineering Sciences and Design, 6(1), 87-92, 2018.
  40. S. Agarwal, and J. S. Bhist, "Data hiding in digital image processing using cryptography and steganography." International Research Journal of Engineering and Technology, (IRJET), 3(5), 1600-1603, 2016.
  41. M. Shirali-Shahreza, and M. H. Shirali-Shahreza, "Text Steganography in SMS." International Conference on Convergence Information Technology (ICCIT), IEEE, Gyeongju, 2007, pp. 2260-2265.
  42. H. Singh, P. K. Singh, and K. Saroha, “A Survey on Text Based Steganography." Proceedings of the 3rd National Conference; INDIACom, 2009.
  43. C. Gayathri, and K. Kalpana, "Study on Image Steganography Techniques." International Journal of Engineering and Technology (IJET), 5(2), 572-577, 2013.
  44. M. Kumar, and A. Rani, "A Short Survey on Steganography." International Journal of Computer Science and Technology, IJCST, 4(1), 181-185, 2013.
  45. D. Rana, "A Review paper on Steganography Techniques." International Journal of Modern Trends in Engineering and Research, (IJMTER), 1(6), 74-82, 2014.
  46. A. Singh, and C. Verma, "Image Steganography Techniques: A Review." International Journal of Engineering Sciences & Research Technology, IJESRT, 7(7), 18-23, 2018.
  47. K. M. Jeevan, and S. Krishnakumar, “Image hiding technique using a pseudo hexagonal structure approach." International Journal of Computers and Applications, 41(5), 359-366, 2018.
  48. F. Sönmez, F. Takaoğlu, and O. Kaynar, "Ideal Steganography Scenario: Calculation of Capacities of Carrier Images, OPA Method in Frequency Based Steganography." ACTA INFOLOGICA, 2(1), 12-21, 2018.
  49. C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, "Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems." IEEE Transactions on Information Forensics and Security, 3(3), 488-497, 2008.
  50. Internet: F. Zioner, LSB-Steganography, https://www.kitploit.com/2018/02/lsb-steganography-python-program-to.html, 2018.
  51. R. Kaur, and Pooja, "Steganography based image compression." International Journal of Advanced Engineering, Management and Science (IJAEMS), 2(6), 685-690, 2016.
  52. F. Takaoğlu, Performance Analysis in DWT and DCT Steganography, Master's Thesis, İstanbul Aydın University, Graduate School of Natural and Applied Sciences, 2016.
  53. D. V. Patil, and S. Dubey, "Review Paper on Image Steganography." International Journal of Research in Computer Applications and Robotics, IJRCAR, 2(6), 35-40, 2014.
  54. S. U. Maheswari, and D. J. Hemanth, "Different methodology for image steganography-based data hiding: Review paper." International Journal of Information and Communication Technology, 7(4/5), 521, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Data hiding Techniques of Steganography