A Review Study on Unique Way of Information Hiding: Steganography

Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.

[1]  Samir Kumar Bandyopadhyay,et al.  GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY , 2011 .

[2]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[3]  Simying Ong,et al.  An enhanced mechanism for image steganography using sequential colour cycle algorithm , 2013, Int. Arab J. Inf. Technol..

[4]  B SamirKumar,et al.  GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGESTEGANOGRAPHY , 2010 .

[5]  J. Vijay Anand,et al.  New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security , 2011, ICCCS '11.

[6]  Rahul Garg,et al.  Detecting LSB Steganography in Images , 2008 .

[7]  Namita Tiwari,et al.  Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , 2010 .

[9]  Harjit Singh Analysis of Different Types of Steganography , 2016 .

[10]  Sangita Roy,et al.  A novel approach to format based text steganography , 2011, ICCCS '11.

[11]  S. K. Sharma,et al.  A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model , 2017 .

[12]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[13]  Jessica J. Fridrich,et al.  Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[14]  Vahab Iranmanesh,et al.  Text Steganography using Daily Emotions Monitoring , 2017 .