A Comparative Study of Recent Steganography Techniques for Multiple Image Formats

Full Text (PDF, 735KB), PP.11-25

Views: 0 Downloads: 0

Author(s)

Arshiya Sajid Ansari 1,* Mohammad Sajid Mohammadi 2 Mohammad Tanvir Parvez 2

1. Noida International University, Department of Computer Science and Engineering, NCR Delhi Noida, India

2. Qassim University, Computer Engineering Department, Qassim, Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.01.02

Received: 20 Feb. 2018 / Revised: 25 Jun. 2018 / Accepted: 12 Nov. 2018 / Published: 8 Jan. 2019

Index Terms

Image Steganography, Steganography Embedding Domain, Steganography File Format

Abstract

Steganography is the technique for exchanging concealed secret information in a way to avoid suspicion. The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret message and the cover object. This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file formats. We also discuss the embedding domains along with a discussion on salient technical properties, applications, limitations, and Steganalysis.

Cite This Paper

Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez, "A Comparative Study of Recent Steganography Techniques for Multiple Image Formats", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.1, pp.11-25, 2019. DOI:10.5815/ijcnis.2019.01.02

Reference

[1]Parvez, Mohammad Tanvir and Adnan Abdul-Aziz Gutub, (2011), "Vibrant color image Steganography using channel differences and secret data distribution”, Kuwait J Sci Eng 38, no. 1B 127-142.
[2]Amirtharajan, Rengarajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, and John Bosco Balaguru Rayappan.. (2010), "Colour guided colour image Steganography”. arXiv preprint arXiv: 1010.4007.pp 1-23.
[3]Singh, Rama Kant, and Brejesh Lall..(2013)."Saliency map based image Steganography". In Image and Vision Computing New Zealand (IVCNZ), 28th IEEE International Conference of, pp. 430-435.
[4]Muhammad, K., Ahmad, J., Farman, H. and Zubair, M.(2015)," A novel image steganographic approach for hiding text in color images using HSI color model". arXiv preprint arXiv:1503.00388.,pp 1-11.
[5]Reddy, V. Lokeswara.,(2015),"Novel Chaos Based Steganography for Images Using Matrix Encoding and Cat mapping Techniques”. Information Security and Computer Fraud 3, pp. 1: 8-14.
[6]Srinivasan, Avinash, Jie Wu, and Justin Shi.(2015),"Android-Stego: a novel service provider imperceptible MMS Steganography technique robust to message loss". In Proceedings of the 8th International Conference on Mobile Multimedia Communications, ICST, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. pp. 205-212.
[7]Zhang, Yi, Xiangyang Luo, Chunfang Yang, Dengpan Ye, and Fenlin Liu, (2015),"A JPEG comparison Resistant Adaptive Steganography based on the Relative relationship between DCT coefficients.10th international conference on availability and security. 978-1-4673-6590-1/14IEEE DOI.10.1109/ARES2015.53.
[8]Yang, Ching-Nung, Cheonshik Kim, and Yen-Hung Lo. (2016),"Adaptive real-time reversible data hiding for JPEG images." Journal of Real-Time Image Processing, pp 1-11. Springer.
[9]Hiney, Jason, Tejas Dakve, Krzysztof Szczypiorski, and Kris Gaj,(2015),"Using Facebook for Image Steganography". In Availability, Reliability, and Security (ARES)", 10th International Conference on, pp. 442-447. IEEE.
[10]Amirtharajan, Rengarajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, and John Bosco Balaguru Rayappan. (2010), "Colour guided color image Steganography". arXiv preprint arXiv:1010.4007.
[11]Fridrich.J, (1999), April.” A new steganographic method for palette-based images”. In PICS pp. 285-289.
[12]Sujitha, P., and G. Murali, (2013),"Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing". International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Volume2, Issue 11.
[13]Zin, Wai. "Message Embedding In PNG File Using LSB Steganographic Technique. November (2013)". International Journal of Science and Research (IJSR) Volume 2.
[14]Chen, Yung-Fu, Show-Wei Chien, and Hsuan-Hung Lin. (2009),"True color image Steganography using palette and minimum spanning tree". WSEAS International Conference. Proceedings. Mathematics and Computers in Science and Engineering. Ed. Lifent Xi. No. 3. World Scientific and Engineering Academy and Society.
[15]Shahida, T, & Sobin, C. (2014). “An Efficient Method for Improving Hiding Capacity for JPEG2000 Images”. In Proceedings of International Conference on Internet Computing and Information Communications pp. 159-168 Springer India.
[16]Wang, C. and Ni, J,( 2012), March. “An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients”. In Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on pp. 1785-1788. IEEE.
[17]Ramaiya M. K., Hemrajani N., and Saxena A. K.,( 2013), "Security Improvisation in image Steganography using DES”. in Advance Computing Conference (IACC), IEEE 3rd International, pp. 1094-1099.
[18]Grover N. and Mohapatra A., (2013),"Digital Image Authentication Model Based on Edge Adaptive Steganography". in Advanced Computing, Networking and Security (ADCONS), 2nd International Conference on, pp. 238-242.
[19]Hemalatha, S., U. Dinesh Acharya, A. Renuka, and Priya R. Kamath, (February 2013),"A secure and high capacity image Steganography technique". Signal & Image Processing An international journal (SIPIJ)), Vol No 4: 83.
[20]Pooja Rai; Sandeep Gurung; M K hose, (March 2015),"Analysis of Image Steganography Techniques". International Journal of Computer Applications, ISSN 0975-8887, Volume 114, Issue 1, pp. 11 – 17.
[21]Huang, Fangjun, Jiwu Huang, and Yun-Qing Shi. (2012) "New channel selection rule for JPEG Steganography". Information Forensics and Security, IEEE Transactions on 7.4: 1181-1191.
[22]Holub, V., Fridrich, J., & Denemark, T. (2014). “Universal distortion functions for Steganography in an arbitrary domain”. EURASIP Journal on Information Security, 2014(1), 1-13.
[23]Al-Nofaie, Safia, Manal Fattani, and Adnan Gutub, (2016),"Capacity Improved Arabic Text Steganography Technique Utilizing ‘Kashida’ with Whitespaces". The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016).
[24]Arshiya Tazeen and Abdul Rahim, (January-2017),”Encrypting Images by Patch-Level Sparse Representation for High Capacity Reversible Data Hiding”. ISSN 2348–2370 Vol.09, Issue.01, Pages: 0001-0008.
[25]Jiang, N., Zhao, N., & Wang, L. (2016).”LSB based quantum image Steganography algorithm”. International Journal of Theoretical Physics, 55(1), 107-123.
[26]Bas, Patrick. (2016), "Natural Steganography: cover-source switching for better Steganography". arXiv preprint arXiv:1607.07824.
[27]Nancy Garg, 2 Kamalinder Kaur, (Nov-Dec 2016),” Data Storage Security Using Steganography Techniques”. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 4, Issue 6, PP.93-98.
[28]Desai, M. B., & Patel, S. V. (2014).” Survey on Universal Image Steganalysis”. International Journal of Computer Science and Information Technologies, 5(3), 4752-4759.
[29]Mishra, R., Mishra, D., Ranjan, A., and Gupta, H. (2015). "A Survey on Secure Image Steganography based on F5 Algorithm". IJEIR, 4(2), pp.344-347.
[30]Ghasemzadeh, H., & Kayvanrad, M. H. (2017).” A Comprehensive Review of Audio Steganalysis Methods”. arXiv preprint arXiv:1701.05611.
[31]Kaur, M. and Kaur, G. (2014).” Review of Various Steganalysis Techniques”. (IJCSIT) International Journal of Computer Science and Information Technologies, 5(2).
[32]Suryawanshi, G.R., and Mali, S.N.(2015). "Study of Effect of DCT Domain Steganography Techniques in Spatial Domain for JPEG Images Steganalysis". International Journal of Computer Applications, 127(6), pp.16-20.
[33]Priya, R. L., Eswaran, P., & Kamakshi, S. P. (2013May). "Blind Steganalysis With Modified Markov Features And RBFNN". In International Journal of Engineering Research and Technology, Vol. 2, No. ESRSA Publications.
[34]Zhan, S. H., & Zhang, H. B. (2007, August).” Blind Steganalysis using wavelet statistics and ANOVA”. In Machine Learning and Cybernetics, 2007 International Conference on Vol. 5, pp. 2515-2519. IEEE.
[35]Ng, W.W., He, Z.M., Chan, P.P. and Yeung, D.S.(2011 July). “Blind Steganalysis with high generalization capability for different image databases using L-GEM”. In Machine Learning and Cybernetics (ICMLC), 2011 International Conference on Vol. 4, pp. 1690-1695. IEEE.
[36]Yan, Y., Li, L., & Zhang, Q. (2013).” Universal Steganalysis method based on multi-domain features. Jornal of Information & Computational Science”. 10(7), 2177-2185.
[37]Wu, S., Zhong, S. and Liu, Y.(2017). "Deep residual learning for image Steganalysis". Multimedia Tools and Applications, Springer, pp.1-17.
[38]Yamini, B. and Sabitha, R. (2016 Jan),"Universal Steganalysis Defend Against Adaptive Steganography Attack using MX Quadtree Neighbor Finding Mechanism". Indian Journal of Computer Science and Engineering (IJCSE) ISSN: 0976-5166 Vol. 6.
[39]Badr, S. M., Ismaial, G., & Khalil, A. H. (2014).” A Review on Steganalysis Techniques From Image Format Point of View”. International Journal of Computer Applications, Volume 102– No.4.
[40]Couchot, J. F., Salomon, M., & Couturier, R. (2016). “Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the Appropriate Steganalyzer between CNN and SRM+ EC”. arXiv preprint arXiv:1612.08882.
[41]Zhou, H., Chen, K., Zhang, W., & Yu, N. (2017). “Comments on Steganography Using Reversible Texture Synthesis”. IEEE Transactions on Image Processing, 26(4), 1623-1625.
[42]Albahar, M. A., Olawumi, O., Haataja, K., & Toivanen, P. (2017)." A Novel Method for Bluetooth pairing using Steganography", International Journal on Information Technology and Security, 9(1), 53-66.
[43]Li, F., Zhang, X., Chen, B., & Feng, G. (2013). “JPEG Steganalysis with high-dimensional features and Bayesian ensemble classifier”. IEEE Signal Processing Letters, 20(3), 233-236.
[44]Pan, Y., Ni, J., & Su, W. (2016, July). “Improved Uniform Embedding for Efficient JPEG Steganography”. In International Conference on Cloud Computing and Security pp. 125-133. Springer International Publishing.
[45]Pelosi, Michael J.; Kessler, Gary; and Brown, Michael Scott S., (2016). "One-Time Pad Encryption Steganography System", Annual Conference on Digital Forensics, Security and Law. 4.CDFSL Proceedings 2016.
[46]Pandey, Sarita, and Vimal Parganiha. (1 January 2017),"Hiding Secret Image In Video." International Journal of Research In Science & Engineering e-ISSN: 2394-8299 Volume: 3 Issue: p-ISSN: 2394-8280.
[47]Richa Khare, Rachana Mishra, Indrabhan Arya,(2014). "Video-Steganography By LSB Technique using Neural Network". IEEE 2014 sixth international conference on computational intelligence and communication networks.
[48]Debnath, B., Das, J.C. and De, D.,(2017). "Reversible logic-based image Steganography using quantum-dot cellular automata for secure Nano communication". IET Circuits, Devices & Systems, 11(1), pp.58-67.
[49]Moradi, M. (2017). “Combining and Steganography of 3d face textures”. arXiv preprint arXiv:1702.01325.
[50]Research on Steganalysis, (dated 13/02/2017) https://web.njit.edu/~shi/Steganalysis/steg.htm
[51]Steganalysis Tools, (23/04/2017). http://stegsecret.sourceforge.net
[52]Free Software Information ( 23/04/2017) http://listoffreeware.com/list-of-best-free- Steganography-software-for-windows
[53]Steganography tools, https://en.wikipedia.org/wiki/Steganography_tools (20/03/2017)
[54]Noman Koren, (22/09/2016) http://www.normankoren.com/pixels_images.html
[55]Harris Geospatial Solutions,( 10/09/2016) https://www.harrisgeospatial.com/docs/READ_TIFF.html
[56]PNG Information,(27/04/2017), https://www.lifewire.com/png-file-2622803
[57]BMP Information (27/04/2017), http://www.digicamsoft.com/bmp/bmp.html
[58]Information, (27/04/2017), http://www.ssuitesoft.com/ssuitepicselsecurity.htm
[59]Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez, (2017), "JPEG Image Steganography based on Coefficients Selection and Partition". International Journal of Image, Graphics and Signal Processing (IJIGSP), Vol.9, No.6, pp.14-22, 2017.DOI: 10.5815/ijigsp.2017.06.02.
[60]Pradhan, A., Sekhar, K. R., & Swain, G. (2017). “Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks”. Security and Communication Networks”, 2017.
[61]Rojali, Salman, A. G., & George. (2017, August). "Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary-based compression methods". In AIP Conference Proceedings (Vol. 1867, No. 1, p. 020059). AIP Publishing.
[62]Ramaiya, M. K., Goyal, D., & Hemrajani, N. (2017). "Data Hiding in Image using Cryptography and Steganography, an Investigation". International Journal, 8(7).
[63]Sharifzadeh, M., Agarwal, C., Salarian, M., & Schonfeld, D. (2017). “A New Parallel Message-distribution Technique for Cost-based Steganography”. arXiv preprint arXiv:1705.08616.
[64]Denemark, T., & Fridrich, J. (2017). “Steganography with Multiple JPEG Images of the Same Scene”. IEEE Transactions on Information Forensics and Security.
[65]Wang, Z., Yin, Z., & Zhang, X. (2017).“Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain”. IETE Technical Review,1-8.
[66]Liu, C. L., & Liao, S. R. (2008). “High-performance JPEG steganography using complementary embedding strategy”. Pattern Recognition, 41(9), 2945-2955.
[67]Akhtar, N., Khan, S. and Johri, P., (2014), February. An improved inverted LSB image steganography. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on pp. 749-755. IEEE.
[68]Umbarkar, A. J., Kamble, P. R., & Thakre, A. V. (2016). Comparative Study Of Edge-Based LSB Matching Steganography For Color Images". ICTACT Journal on Image & Video Processing, 6(3).
[69]Oktavianto, B., Purboyo, T. W., & Saputra, R. E. (2017).” A Proposed Method for Secure Steganography on PNG Image Using Spread Spectrum Method and Modified Encryption”. International Journal of Applied Engineering Research, 12(21), 10570-10576.
[70]Sharma, Aditi, Monika Poriye, and Vinod Kumar. (June 2017)."A Secure Steganography Technique Using MSB”, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 Volume-6, Issue-6.
[71]Kumar, Dr. Sushil, (2017). "A TQWT Based Approach for Image Steganography", Mathematical Sciences International Research Journal Vol 6 Issue 1 ISSN 2278 – 8697.
[72]Tarun Kumar, Shikha Chauhan,(2018)."Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach", International Journal of Computer Network and Information Security (IJCNIS), Vol.10, No.3, pp.60-66, DOI: 10.5815/ijcnis.2018.03.07.
[73]Sengul Dogan, 2018."A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.1, pp.1-9,.DOI: 10.5815/ijcnis.2018.01.01.
[74]Ahmed A. Abu Aziz, Hasan N.Qunoo, Aiman A. Abu Samra, 2018. "Using Homomorphic Cryptographic Solutions on E-voting Systems", International Journal of Computer Network and Information Security (IJCNIS), Vol.10, No.1, pp.44-59,.DOI: 10.5815/ijcnis.2018.01.06.