CREATING STEGO-IMAGES THROUGH HIDING SINGLE AND MULTIPILE DATA USING DIFFERENT STEGANOGRAPHIC TOOLS

Recently, the concept of ‘Image Steganography’ is became an important issue in the computer security world. Image steganography simply means hide some secret data into an object. The object can be a text, an image or a sound, but the most popular cover object used for hidden secret message is images. On the other hand, to detect these hidden messages, many methods and techniques can be used as well. However, the procedures of detecting any hidden data, is called ‘Steganalysis’. This paper focuses on creating stego-images through hiding secret messages into clean images. It also reviews some image steganography methods and tools. In order to create a number of stego-images, three steganographic tools are used. They are: OpenStego, S-Tools and F5 algorithm. With respect to the hidden data, one and more hidden data file is embedded. In addition, testing for differentiating between stego-images created and the clean one is presented.

[1]  Jessica Fridrich Steganography in Digital Media: Preface , 2009 .

[2]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[3]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[4]  Huayong Ge,et al.  Steganography and steganalysis based on digital image , 2011, 2011 4th International Congress on Image and Signal Processing.

[5]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[6]  Yixian Yang,et al.  Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[7]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[8]  Max A. Viergever,et al.  Mutual-information-based registration of medical images: a survey , 2003, IEEE Transactions on Medical Imaging.

[9]  Sushil Jajodia,et al.  Information Hiding: Steganography and Steganalysis , 2005 .

[10]  B. B. Zaidan,et al.  Overview: Main Fundamentals for Steganography , 2010, ArXiv.