CFP last date
20 May 2024
Reseach Article

A Comparative Analysis of Steganographic Data Hiding within Digital Images

by P. Rajkumar, R. Kar, A. K. Bhattacharjee, H. Dharmasa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 1
Year of Publication: 2012
Authors: P. Rajkumar, R. Kar, A. K. Bhattacharjee, H. Dharmasa
10.5120/8382-1981

P. Rajkumar, R. Kar, A. K. Bhattacharjee, H. Dharmasa . A Comparative Analysis of Steganographic Data Hiding within Digital Images. International Journal of Computer Applications. 53, 1 ( September 2012), 1-6. DOI=10.5120/8382-1981

@article{ 10.5120/8382-1981,
author = { P. Rajkumar, R. Kar, A. K. Bhattacharjee, H. Dharmasa },
title = { A Comparative Analysis of Steganographic Data Hiding within Digital Images },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 1 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number1/8382-1981/ },
doi = { 10.5120/8382-1981 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:52:59.645100+05:30
%A P. Rajkumar
%A R. Kar
%A A. K. Bhattacharjee
%A H. Dharmasa
%T A Comparative Analysis of Steganographic Data Hiding within Digital Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 1
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A huge deployment of effective steganography by several techniques with varying degrees of payload, peak signal to noise ratio (PSNR), robustness, perceptual transparency and so on has been evidenced. Steganography has been effective as an alternative to cryptography and has been projected to the forefront of digital security by the explosive growth in computational power, security awareness and through widespread intellectual pursuit. The current techniques for Steganography reviewed include substitution method such as least significant bit (LSB) and transform domain methods such as discrete cosine transform (DCT) and discrete wavelet transform (DWT). In this paper, the techniques involved with LSB, DCT and DWT are analyzed with the proper use of the performance metrics and then the techniques have been modeled by computer simulations. The results from simulation indicate that the LSB technique, although easy to implement and encode and having good payload capacity, is easily prone to statistical attack, since the histogram plots are revealing the data hidden within. On the other hand, transform domain techniques are more robust to statistical attacks but at the cost of reduced payload.

References
  1. Frank Y. Shih, "Digital Watermarking and Steganography- Fundamentals and Techniques", CRC Press 2008.
  2. Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon, "Performance study of common image steganography and steganalysis techniques", Journal of Electronic Imaging 15(4), 041104 Dec 2006.
  3. Mohammad Ali Bani Younes and Aman Jantan, " A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 6, June 2008.
  4. Hany Farid," Detecting Steganographic Messages in Digital Images", Department of Computer Science Dartmouth College Hanover NH 03755. Department Notes. http:// www. cs. dartmouth. edu/farid/ publications/tr01. pdf
  5. Ismail Avc?bas, Nasir Memon and Bülent Sankur, "Steganalysis Using Image Quality Metrics", IEEE Transactions on Image Processing, Vol. 12, No. 2, February 2003.
  6. K. B. Raja, Kiran Kumar K. , Satish Kumar N. , Lakshmi M. S. , Preeti H. ,Venugopal KR. , and Lalit M. Patnaik, "Genetic Algorithm Based Steganography Using Wavelets", Lecture notes in Computer Science. P. McDaniel and S. K. Gupta (Eds. ): ICISS 2007, LNCS 4812, pp. 51–63, Springer-Verlag Berlin Heidelberg.
  7. R. Amirtharajan, R. Akila, P. Deepika, "A Comparative Analysis of Image Steganography", International Journal of Computer Applications (0975-8887) Volume 2 – No. 3, May 2010.
  8. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, "Digital Image Steganography: Survey and Analysis of Current methods", Elsevier, Signal Processing 90 (2010) 727-752.
  9. Digital Image Steganography – A Gentle Overview, Pradeep Kumar Saraswat and RK Gupta, International Journal of Computer Science and Information Technology, Vol. 2 (2), 2012, 129-136
  10. Ali Al-Ataby1 and Fawzi Al-Naima2, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform, the International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
  11. Lisa M. Marvel, Charles T. Retter, Charles G. Boncelet Jr. : Hiding Information in Images. 396-398 Proceedings of the 1998 IEEE International Conference on Image Processing (ICIP-98), Chicago, Illinois, October 4-7, 1998. IEEE Computer Society, 1998, ISBN 0-8186-8821-1, Volume 2
  12. N. F. Johnson, and S. Jajodia, "Steganography: Seeing the Unseen," IEEE Computer magazine, February 1998, pp. 26-34.
  13. Johnson, N. F. , Jajodia, S. Steganalysis of Images Created Using Current Steganography Software. [online] 1998. Available at http://www. jjtc. com/ihws98/jjgmu. html.
  14. Johnson, N. F. , Jajodia, S. Steganalysis: The Investigation of Hidden Information. [online] 1998 September. Available at http://www. jjtc. com/pub/it98a. htm.
  15. Wikipedia - The Free Encyclopedia. Steganalysis. [online] 2004 May. Available at http://en. wikipedia. org/wiki/Steganalysis.
  16. Petitcolas, F. A. P. , Anderson, R. , Kuhn, M. G. , "Information Hiding - A Survey", July1999, URL:http://www. cl. cam. ac. uk/~fapp2/publications/ieee99-infohiding. pdf
  17. Ingemar J. Cox, Mattew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, "Digital Watermarking and Steganography", Second Edition, Elsevier, Morgan Kaufmann Publishers Series in Computer Security, 2008.
  18. B. B Zaidan, A. A Zaidan, Alaa Taqa, Fazida Othman, "Stego – Image Vs Stego-Analysis System", International Journal of Computer and Electrical Engineering, Vol. 1, No. 5, December 2009.
  19. Lifang Yu, Yao Zhao, Rongrong Ni and Ting Li, "Improved Adaptive LSB Steganography based on Chaos and Genetic algorithm". EURASIP Journal on Advanced in Signal Processing 2010.
  20. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, "Digital Image Processing Using MATLAB' Pearson Education, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Payload PSNR Histogram LSB DCT DWT Steganalysis