scispace - formally typeset
Journal ArticleDOI: 10.1080/19393555.2020.1801911

Analysis of various data security techniques of steganography: A survey

04 Mar 2021-Information Security Journal: A Global Perspective (Taylor & Francis)-Vol. 30, Iss: 2, pp 63-87
Abstract: The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...

... read more

Topics: Steganography (60%), Discrete cosine transform (59%), Data security (56%) ... show more
Citations
  More

11 results found


Open accessJournal ArticleDOI: 10.1109/ACCESS.2021.3089357
14 Jun 2021-IEEE Access
Abstract: Internet of Things (IoT) is a domain where the transfer of big data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques. These techniques are crucial when dealing with user authentication and data privacy. In the proposed work, a highly secured technique is proposed using IoT protocol and steganography. This work proposes an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique. Thereafter a Salp Swarm Optimization Algorithm (SSOA) based adaptive embedding process is proposed to increase the payload capacity by setting different parameters in the steganographic embedding function for edge and smooth blocks. Here the SSOA algorithm is used to localize the edge and smooth blocks efficiently. Then, the hybrid Fuzzy Neural Network with a backpropagation learning algorithm is used to enhance the quality of the stego images. Then these stego images are transferred to the destination in the highly secured protocol of IoT. The proposed steganography technique shows better results in terms of security, image quality, and payload capacity in comparison with the existing state of art methods.

... read more

Topics: Steganography (60%), Cryptography (53%), Encryption (53%)

12 Citations



Journal ArticleDOI: 10.1002/CPE.6448
Sachin Dhawan1, Rashmi Gupta1Institutions (1)
Abstract: There has been a developing extension in the utilization of steganography, because of the advancement in utilizing web innovation and interactive media innovation. Subsequently, these days, the data are not made sure about adequately while transmitting it over the system. Data are the most significant resource for the current electronic communication framework. Thus the data security has played a significant job to give protection from unapproved people. Steganography is the technique that provides the solution for this challenge. This article proposes a novel type of steganography strategy in which it uses the hybrid algorithm for higher security and a hybrid fuzzy neural network is utilized for the good quality of stego images. For higher security, this article utilizes the Sobel and Kirsch edge identifier and then the Vernam algorithm utilized for encrypting the secret image. Thereafter this article utilizes the combination of fuzzy logic and neural network for enhancing the quality of stego images. There are various advantages of this technique that it can be utilized in various areas, for example, confidential data communication in the defense sector, medical, electronic governance, banking, communication, and so on.

... read more

Topics: Fuzzy logic (59%), Steganography (54%), Artificial neural network (53%)

1 Citations



Book ChapterDOI: 10.4018/978-1-7998-7160-6.CH003
R. Gurunath1, Debabrata Samanta1Institutions (1)
01 Jan 2021-
Abstract: There is an immense advancement in science and technology, and computing systems with the highest degree of security are the present hot topic; however, the domination of hackers and espionage in terms of disclosing the sensitive information are steadily increasing. This chapter presents a theoretical view and critical examination of the few text steganography methods in the contemporary world. It tells the direction in which research has developed over the past few years. Cryptography, the encipherment to a certain extent, protects the data by making it unreadable but not safe. Improvisation of the same can be done using another layer of protection that is steganography in which the secret embedded inside the cover text will not be revealed.

... read more


References
  More

127 results found


Open accessJournal ArticleDOI: 10.1109/5.771065
01 Jul 1999-
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

... read more

Topics: Encryption (53%), Military communications (52%), Electronic mail (52%) ... show more

2,476 Citations


Open accessJournal ArticleDOI: 10.1137/05064182X
Abstract: This paper describes two digital implementations of a new mathematical transform, namely, the second generation curvelet transform in two and three dimensions. The first digital transformation is based on unequally spaced fast Fourier transforms, while the second is based on the wrapping of specially selected Fourier samples. The two implementations essentially differ by the choice of spatial grid used to translate curvelets at each scale and angle. Both digital transformations return a table of digital curvelet coefficients indexed by a scale parameter, an orientation parameter, and a spatial location parameter. And both implementations are fast in the sense that they run in O(n^2 log n) flops for n by n Cartesian arrays; in addition, they are also invertible, with rapid inversion algorithms of about the same complexity. Our digital transformations improve upon earlier implementations—based upon the first generation of curvelets—in the sense that they are conceptually simpler, faster, and far less redundant. The software CurveLab, which implements both transforms presented in this paper, is available at http://www.curvelet.org.

... read more

Topics: Curvelet (62%), Fast Fourier transform (56%), Phase correlation (54%) ... show more

2,446 Citations


Proceedings ArticleDOI: 10.1109/ICCV.2015.352
07 Dec 2015-
Abstract: Visual object tracking is challenging as target objects often undergo significant appearance changes caused by deformation, abrupt motion, background clutter and occlusion. In this paper, we exploit features extracted from deep convolutional neural networks trained on object recognition datasets to improve tracking accuracy and robustness. The outputs of the last convolutional layers encode the semantic information of targets and such representations are robust to significant appearance variations. However, their spatial resolution is too coarse to precisely localize targets. In contrast, earlier convolutional layers provide more precise localization but are less invariant to appearance changes. We interpret the hierarchies of convolutional layers as a nonlinear counterpart of an image pyramid representation and exploit these multiple levels of abstraction for visual tracking. Specifically, we adaptively learn correlation filters on each convolutional layer to encode the target appearance. We hierarchically infer the maximum response of each layer to locate targets. Extensive experimental results on a largescale benchmark dataset show that the proposed algorithm performs favorably against state-of-the-art methods.

... read more

Topics: Convolutional neural network (61%), Video tracking (55%), Pyramid (image processing) (53%) ... show more

1,546 Citations


Journal ArticleDOI: 10.1016/J.ADVENGSOFT.2017.07.002
Abstract: A novel optimization algorithm called Salp Swarm Optimizer (SSA) is proposed.Multi-objective Salp Swarm Algorithm (MSSA) is proposed to solve multi-objective problems.Both algorithms are tested on several mathematical optimization functions.Two challenging engineering design problems are solved: airfoil design and marine propeller design.The qualitative and quantitative results prove the efficiency of SSA and MSSA. This work proposes two novel optimization algorithms called Salp Swarm Algorithm (SSA) and Multi-objective Salp Swarm Algorithm (MSSA) for solving optimization problems with single and multiple objectives. The main inspiration of SSA and MSSA is the swarming behaviour of salps when navigating and foraging in oceans. These two algorithms are tested on several mathematical optimization functions to observe and confirm their effective behaviours in finding the optimal solutions for optimization problems. The results on the mathematical functions show that the SSA algorithm is able to improve the initial random solutions effectively and converge towards the optimum. The results of MSSA show that this algorithm can approximate Pareto optimal solutions with high convergence and coverage. The paper also considers solving several challenging and computationally expensive engineering design problems (e.g. airfoil design and marine propeller design) using SSA and MSSA. The results of the real case studies demonstrate the merits of the algorithms proposed in solving real-world problems with difficult and unknown search spaces.

... read more

Topics: Multi-swarm optimization (62%), Metaheuristic (60%), Meta-optimization (58%) ... show more

1,502 Citations


Open accessJournal ArticleDOI: 10.1016/J.SIGPRO.2009.08.010
01 Mar 2010-Signal Processing
Abstract: Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science it can be used for ill intentions. It has been propelled to the forefront of current security techniques by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed.

... read more

Topics: Steganography tools (74%), Steganography (66%), Steganalysis (62%) ... show more

1,410 Citations


Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20221
202110
Network Information
Related Papers (5)
Bit-4 of frequency domain-DCT steganography technique28 Jul 2009

Nedal M. S. Kafri, Hani Y. Suleiman

80% related
A 2-Level DWT Based Approach for the Implementation of01 Jan 2015

Image Steganography, Priyanka B. Kutade +1 more

80% related
Performance evaluation of DWT based image steganography01 Mar 2010

Vijay Kumar, Dinesh Kumar

79% related