Overview of Digital Steganography Methods and Its Applications

Steganography is the skill of communicating secret data by embedding it into multimedia carriers like image, audio, videos. The ultimate goal here is to mask the very existence of the embedded data. Even though the term Steganography has been known for thousands of years, its digital form came about only lately and research was make stronger after the depressing event on 11 th Sep 2001(Twin towers). In contrast to Steganography, Steganalysis is the official counter attack science used for detects and or estimate the hidden information with little knowledge of Steganography algorithms. Steganography’s ultimate intentions are robustness, undetectability, and size of the hidden data. This paper provides a survey review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper completes with some recommendations and advantages of Steganography techniques and current research scopes.

[1]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .

[2]  Heung-Kyu Lee,et al.  Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..

[3]  Weiming Zhang,et al.  A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.

[4]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[5]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[6]  Jessica J. Fridrich,et al.  Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.

[7]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[8]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[9]  Heung-Kyu Lee,et al.  Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function , 2008, PCM.

[10]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[11]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[12]  Gulve Avinash,et al.  A Image Steganography Method with Five Pixel Pair Differencing and Modulus Function , 2013 .

[13]  J. K. Mandal,et al.  Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow , 2012, ArXiv.

[14]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[15]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[16]  Deepa Kundur,et al.  Digital video steganalysis exploiting collusion sensitivity , 2004, SPIE Defense + Commercial Sensing.

[17]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[18]  Chin-Feng Lee,et al.  A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..

[19]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[20]  Te-Ming Tu,et al.  A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..

[21]  Hong-Juan Zhang,et al.  A Novel Image Steganography Algorithm Against Statistical Analysis , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[22]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[23]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[24]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[25]  HwangMin-Shiang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008 .

[26]  Mee Young Sung,et al.  Steganography using block-based adaptive threshold , 2007, 2007 22nd international symposium on computer and information sciences.

[27]  K GulveAvinash,et al.  A Image Steganography Method with Five Pixel Pair Differencing and Modulus Function , 2013 .