Different Techniques of Steganography

Categories: Free Essays

Abstract

As very few of us know that steganography is art and science of hiding the information. Information would be in every form like text, audio, video and images. Steganography is the most important area of research in recent year. This technique is been started used in different applications where admin or owner of the data needs to hide their important information's. It is the science of embedding information into the cover image as well as text, and video without disturbing the real information.

The steganography technique created a challenging task of transferring the embedded information to the destination without being detected. This paper deals with hiding text in different mediums using different techniques and comprehension comparative of that techniques.

Introduction

First of all the word Steganography' is the Greek word. Stego' meaning Cover' and the word Grafia' meaning is Writing' which represent as Cover Writing'. In old times people send data or important information using letters and books. In those old days people also use some different ways to secure their data or information.

Get quality help now
Doctor Jennifer
Doctor Jennifer
checked Verified writer

Proficient in: Free Essays

star star star star 5 (893)

“ Thank you so much for accepting my assignment the night before it was due. I look forward to working with you moving forward ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

Data security is very big deal now days too because now we are living in the era where people are surrounding by advance technology like internet, computer, mobile etc. As we know these devices very helpful in sending data from one user to other user but data leakage or hacking also very big problem. Hackers hack into other person systems and can easily excess their secure data. To deal with these problem scientists introduced the method Steganography'.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

There are many method or techniques in steganography like spatial domain, transform domain, spread spectrum, vector embedding, masking and filtering, distortion and lastly statistical. These are the technique helpful in making our communications secure.

Steganography in Digital Mediums

There are five digital mediums where steganography is commonly used to hide the data. The list of those five mediums is following: Text Steganography Image Steganography Network Steganography Audio Steganography Video Steganography3.1 Text SteganographyThe techniques which are used in text steganography are numbers of tabs, white spaces, and capital letters, just like Morse code which is used to achieve or decide the hiding information in the text.

Image Steganography

In image steganography pixels are used to hide the secret information. The 8 and 16 bit images are most common images in used in image steganography technique. The large images required compressions to avoid the detection of hiding data. LSB, BPC and PVD are some common techniques which are usually used in image compression method.

Network Steganography

In network steganography where taking cover objects as network like TCP, UDP and IP etc, where protocol is commonly used as carrier is usually called network protocol steganography.3.4 Audio SteganographyIn audio steganography taking audio as source for hiding the information is usually called audio steganography. This is the one of the most important medium of secret data transferring due to VOIP (Voice over internet protocol) technique popularity, audio steganography is considers as most reliable source among all methods. This technique can be used in following types of audio format like WAVE, MP3, and MIDI etc.

Video Steganography

Video steganography is the technique which is used to hide any kind of files as well as information into digital video format. Video which is the combination of different pictures; these pictures are used as carrier for hiding information or data. This technique can be used in following types of format like H.264, MP4, MPEG and AVI video formats.

Techniques of Steganography

Spatial Domain Methods

Spatial domain steganography known as one of the direct method of object steganography. In spatial domain steganography data hiding process is done directly on the pixels of the image. Spatial domain method applied on image pixels in such a way that the effect of hiding message is not visible on cover image. The spatial domain methods are classified as following:LSB: LSB is one the techniques of spatial domain methods. In LSB transformation some least significant bits are change directly in the image pixel values in hiding the data. A change in the image pixels value in LSB technique is not visible for human eyes. PVD: In PVD (Pixel Value Differencing) two consecutive pixels are selected from the image for hiding the data or information. In PVD pixels are mostly selected from smooth area or from edges. In this method payload plays an important role.BPC: The binary pattern complexity method is used to measure the noise factor in the image. Through this technique noisy portion of the image replaced with binary pattern, and it is mapped with hidden data or information.

Transform Domain Steganography

Transform domain steganography is the more complex method or technique to hide the data/information in an image. In transform domain steganography differ algorithms and transformations are used to hide the information into an image. Transform domain techniques are not depend on the image format. Transform domain steganography have differ kind of various categories such as Discrete Fourier transformation (DFT), discrete cosine transformation (DCT), discrete wavelet transformation (DWT)Discrete Fourier Transform (DFT)

The Discrete Time Fourier transforms uses the discrete time but it converts into the continuous frequency. The algorithm for computing the DFT is very fast on modern computers. This algorithm is known as Fast Fourier Transform i.e. FFTDiscrete Cosine Transform (DCT)Discrete cosine transform technique is similar to discrete Fourier transformation, like discrete Fourier transformation, discrete cosine transforms the signal or image from spatial domain to the frequency domain. The DCT is used in steganography as the Image is broken into 8—8 pixel blocks and transforms these pixel blocks into 64 DCT.

Working from left to right, up to down, the DCT is applied to each block. When desired, image is reconstructed through decompression, a process that uses the Inverse discrete cosine transform that is Inverse Discrete Cosine Transform (IDCT)Discrete Wavelet Transform (DWT)This technique is also used to transform the image from a spatial domain to the frequency domain. In the process of steganography DWT identifies the high frequency and low frequency information of each pixel of the image. This technique provides both frequency and spatial description of the image. Wavelets are created by translations and dilations of a fixed function are known as mother wavelet. According to research DWT is much better technique as compare to DFT and DCT, because it multi resolution description of any image.

Spread spectrum

The concept of spread spectrum is used in this technique. In this method the secret data is spread over a wide frequency bandwidth. The ratio of signal to noise in every frequency band must be so small that it becomes difficult to detect the presence of data. This is one of the most solid techniques of steganography which is usually used in the field of military communication.

Conclusion & Future Work

This paper completely bases on the comprehensive comparative of different steganography techniques. After studding all the techniques of steganography, this field needs more efficient and accurate algorithms for better security. In the field of steganography still many efforts have to be made to increase the embedding capacity and maintain secrecy of the data. Efforts are also be made to hide text files having big size than image size for better transfer of the data. This shows that we can use these techniques in various field like military medical, anti-criminal organization digital forensic and so on. At the end we can easily say that image steganography is the technique of secret communication which has received much attention because steganography is a techniques that can hide data with a low detection rate and high payload.

References

  1. Vasco Pereira and Tiago Sousa, Evolution of Mobile Communications: from 1G to 4G, in Proc. Of The 2nd International Working Conference on Performance Modeling and Evaluation of Heterogeneous Networks, HET-NETs'04, West Yorkshire, U.K., July 2004
  2. M. Pavani1, S. Naganjaneyulu, C. Nagaraju, A Survey on LSB Based Steganography Methods International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 8 August, 2013 Page No. 2464-2467
  3. P. Chen and H. Lin, A DWT Based Approach for Image Steganography, Int. J. of Applied Sci. Eng., vol. 4, no. 3, pp. 275"290, (2006)[5]
  4. G. Kaur and A. Kochhar, A Steganography Implementation based on LSB & DCT, vol. 4, no. 1, pp. 35"41, (2012)
Updated: Nov 01, 2022
Cite this page

Different Techniques of Steganography. (2019, Aug 20). Retrieved from https://studymoose.com/different-techniques-of-steganography-essay

Different Techniques of Steganography essay
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment