scispace - formally typeset
Search or ask a question

Showing papers on "Steganography tools published in 2016"


Journal ArticleDOI
TL;DR: Experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography.
Abstract: Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography.

67 citations


Proceedings ArticleDOI
23 Mar 2016
TL;DR: In this proposed system AES, blowfish, RC6 and BRA algorithms are used to provide block wise security to data and LSB steganography technique is introduced for key information security.
Abstract: Now a day's cloud computing is used in many areas like industry, military colleges etc to storing huge amount of data. We can retrieve data from cloud on request of user. To store data on cloud we have to face many issues. To provide the solution to these issues there are n number of ways. Cryptography and steganography techniques are more popular now a day's for data security. Use of a single algorithm is not effective for high level security to data in cloud computing. In this paper we have introduced new security mechanism using symmetric key cryptography algorithm and steganography. In this proposed system AES, blowfish, RC6 and BRA algorithms are used to provide block wise security to data. All algorithm key size is 128 bit. LSB steganography technique is introduced for key information security. Key information contains which part of file is encrypted using by which algorithm and key. File is splited into eight parts. Each and every part of file is encrypted using different algorithm. All parts of file are encrypted simultaneously with the help of multithreading technique. Data encryption Keys are inserted into cover image using LSB technique. Stego image is send to valid receiver using email. For file decryption purpose reverse process of encryption is applied.

51 citations


Journal ArticleDOI
TL;DR: A merged technique for data security has been proposed using Cryptography and Steganography techniques to improve the security of the information and provides high embedding capacity and high quality stego images.
Abstract: Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known. According to the work in this paper, a merged technique for data security has been proposed using Cryptography and Steganography techniques to improve the security of the information. Firstly, the Advanced Encryption Standard (AES) algorithm has been modified and used to encrypt the secret message. Secondly, the encrypted message has been hidden using method in [1]. Therefore, two levels of security have been provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high quality stego images

45 citations


Journal ArticleDOI
TL;DR: A proposed steganographic tool based on DCT is implemented to hide confidential information about a nuclear reactor, using the sequential embedding method in the middle frequency that supplies a relatively high embedding capacity with no visual distortion in the resultant image.

44 citations


Journal ArticleDOI
TL;DR: The insertion technique in the least significant bit is used to insert images into digital pictures or other secret watermark, using Artificial Neural Networks to hide confidential messages on seemingly innocent messages using steganography.
Abstract: This paper presents a technique for transmitting information efficiently and securely, hiding confidential messages on seemingly innocent messages using steganography. The insertion technique in the least significant bit is used to insert images into digital pictures or other secret watermark. Artificial Neural Networks are used in the process of withdrawal of encrypted information acting as keys that determine the existence of hidden information.

34 citations


Journal ArticleDOI
TL;DR: In the anticipated system, the file which the authors want to make protected is firstly compressed to shrink in size and then the compressed data is transformed into cipher text by using AES cryptographic algorithm and then encrypted data is concealed in the image.

32 citations


Journal Article
TL;DR: This Paper includes steganography, its basic working and insertion techniques used in Image Steganography such as LSB, Chaotic, GLM, Parity checking and Interpolation, and a set of parameters to test the imperceptibility of an algorithm.
Abstract: In this era of Internet, many useful files are shared through internet. For this we need a secure system to protect our secret data from eavesdroppers. Two different technologies are used to make our information secure i.e. cryptography and steganography. In cryptography we do encryption of the secret message but we can’t hide the existence of the secret message. But in steganography we hide the existence of the secret message. Steganography is the art which help us to hide secret information in different multimedia files. As a result, unauthorized users are not able to see and recognize the hidden information. It is a science that manages a secret path for sending information secretly using different multimedia carrier like in image, text, audio and video file. This Paper includes image Steganography, its basic working and insertion techniques used in Image Steganography such as LSB, Chaotic, GLM, Parity checking and Interpolation. It also involves Steganography applications and a set of parameters to test the imperceptibility of an algorithm.

31 citations


Proceedings ArticleDOI
01 Oct 2016
TL;DR: The result shows that the steganographic capacity does not depend on the size of mp3 but on the number of homogeneous frames owned by mp3 audio file, and the method which combined steganography and cryptography, was successfully done without reducing the quality of used mp3audio file.
Abstract: In the internet age, the security of data exchange becomes risky from some tapping attacks. One of the ways to maintain the data's security is by using steganography techniques. In this paper, steganography is combined with cryptography for security enhancement. The cover media is mp3 audio file. Since mp3 is a file that has been widely used in the Internet as a medium of entertainment, the secret message has been embedded to the homogenous frame of mp3 file. Before being embedded into the mp3 file, the secret message was encrypted with Advance Encryption Standard (AES) algorithm using a key that had been processed by Message Digest 5 (MD5) hash function. The secret message file type inserted could be in the form of text, image, audio, video, or compressed file. The result shows that the steganographic capacity does not depend on the size of mp3 but on the number of homogeneous frames owned by mp3 audio file. The result also shows that the method which combined steganography and cryptography, was successfully done without reducing the quality of used mp3 audio file.

31 citations


Proceedings ArticleDOI
01 Feb 2016
TL;DR: Text Steganography is quite difficult than other techniques because of less amount of redundancy and changes can be detected quite easily.
Abstract: Steganography is helping individual to send confidential data between two parties. It enables user to hide data in different digital mediums. Steganography is of many types such as image steganography, text steganography, audio/video steganography etc. Text Steganography is quite difficult than other techniques because of less amount of redundancy and changes can be detected quite easily. Some of the techniques of text steganography has been discussed along with characteristics and working.

29 citations


Journal ArticleDOI
TL;DR: This paper has provided security for information like text/images using the concept of video steganography, cryptography, randomization and parallelization.

29 citations


Journal ArticleDOI
30 Sep 2016
TL;DR: This work proposes modifying the “Kashida” stego-cover techniq ue merging with a new way of embedding sensitive data within Arabic text of the last 30 Chapters of the Holy Quran with clear increase in the capacity as expected without degrading the security.
Abstract: Securing private texts to fully prevent any detection, is a technique called Steganography. Thi s research work of Arabic text steganography focuses on improv ing the hiding secrets within Arabic language text utilizin g the redundant extension “Kashida” letter as covering me dia. We propose modifying the “Kashida” stego-cover techniq ue merging with a new way of embedding sensitive data wi hin whitespaces. This modified merging was tested on hi ding data within Arabic text of the last 30 Chapters of the Holy Quran (Sura Al-Buruj #85 to Sura An-Nas #114) compa ring with both the normal method and the improved propos ed one. The results demonstrated clear increase in the capacity as expected without degrading the security, which j ustifies this work for real promising research direction.

Proceedings ArticleDOI
01 Sep 2016
TL;DR: An image steganography method which clusters the image into various segments and hides data in each of the segment and K-means clustering technique is used to get accurate results.
Abstract: Steganography involves hiding of text, image or any sensitive information inside another image, video or audio in such a way that an attacker will not be able to detect its presence. Steganography is, many times, confused with cryptography as both the techniques are used to secure information. The difference lies in the fact that steganography hides the data so that nothing appears out of ordinary while cryptography encrypts the text, making it difficult for an outsider to infer anything from it even if they do attain the encrypted text. Both of them are combined to increase the security against various malicious attacks. Image Steganography uses an image as the cover media to hide the secret message. In this paper, we propose an image steganography method which clusters the image into various segments and hides data in each of the segment. Various clustering algorithms can be used for image segmentation. Segmentation involves huge set of data in the form of pixels, where each pixel further has three components namely red, green and blue. K-means clustering technique is used to get accurate results. Therefore, we use K-means clustering technique to get accurate results in a small time period.

Journal ArticleDOI
TL;DR: The proposed framework is a further extension of the authors' previous work: steganalysis based on color feature correlation and machine learning classification, and uses two types of features, computed between color image channels, that allow increasing the detectability of hidden messages in the color images.
Abstract: In recent years, information security has received a great deal of attention. To give an example, steganography techniques are used to communicate in a secret and invisible way. Digital color images have become a good medium for digital steganography because of their easy manipulation as carriers via Internet, e-mails, or used on websites. The main goal of steganalysis is to detect the presence of hidden messages in a digital media. The proposed method is a further extension of the authors' previous work: steganalysis based on color feature correlation and machine learning classification. Fusing features with those obtained from color-rich models allows increasing the detectability of hidden messages in the color images. Our new proposition uses two types of features, computed between color image channels. The first type of feature reflects local Euclidean transformations, and the second one reflects mirror transformations. These geometric measures are obtained by the sine and cosine of gradient angles between all the color channels. Features are extracted from co-occurrence correlation matrices of measures. We demonstrate the efficiency of the proposed framework on three steganography algorithms designed to hide messages in images represented in the spatial domain: S-UNIWARD, WOW, and Synch-HILL. For each algorithm, we applied a range of different payload sizes. The efficiency of the proposed method is demonstrated by the comparison with the previous authors work and the spatial color-rich model and color filter array-aware features for steganalysis. Copyright © 2016 John Wiley & Sons, Ltd.

Journal ArticleDOI
TL;DR: A Hash Least Significant Bit (H-LSB) with Affine cipher algorithm has been proposed for providing more security to data in a network environment and has the ability to provide better security while transferring the secret message from one end to the other end in network environment.
Abstract: Nowadays, network has important roles for transferring data accurately and fast from source to a destination. The data is not secure enough to transfer highly confidential. The security of information has become one of the principle challenges of resource sharing with data communication over computer network. Cryptography and Steganography are two methods for protecting data from intruders while transferring over an open channel network. Cryptography is a method to encrypt data and steganography is the art and science of hiding secret message in a cover image. In this paper a Hash Least Significant Bit (H-LSB) with Affine cipher algorithm has been proposed for providing more security to data in a network environment. First we encrypt the data with the new cryptography algorithm and then embed in the image. Eight bits of the secret message are divided into 3, 3, 2 and embedding into the RGB pixels values of the cover image respectively. A hash function is used to select the particular position of insertion in LSB bits. This system allows a message sender to select keys to encrypt the secret message before embedding into the image and a receiver is used the keys to decrypt the message. Receiver can be decrypted the encrypt message with incorrect the keys but to a different form from the original message. This system has the ability to provide better security while transferring the secret message from one end to the other end in network environment.

Journal ArticleDOI
01 Jan 2016
TL;DR: The paper highlights the security improved by applying various techniques of video steganography and the process of Data embedding in the images, text/documented, audio and video files.
Abstract: Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is the technology that attempts to ruin the Steganography by detecting the hidden information and extracting.Steganography is the process of Data embedding in the images, text/documented, audio and video files. The paper also highlights the security improved by applying various techniques of video steganography.

Proceedings ArticleDOI
17 Mar 2016
TL;DR: The Steganalysis technique is discussed by using Bayesian Estimation and Correlation Coefficient based steganalysis methodologies for text by solving the problem of how to find hidden message in text messages.
Abstract: Steganography is the art of hiding data in data in an untraceable way. Main concern of steganography is hiding the existence of hidden message. Steganalysis is the art and science of detecting hidden messages from stego-systems. It also attempts to find hidden message such as the type of embedding algorithm, the length of the message, the content of the message or the secret key used from the carrier (like image, text, video etc.). In this paper, we have discussed the steganalysis technique by using Bayesian Estimation and Correlation Coefficient based steganalysis methodologies for text.

Proceedings ArticleDOI
01 Oct 2016
TL;DR: In order to enhance security mechanism, visual cryptography and image steganography are used together and Neural networks are concerned with identifying the best locations in host image in order to embed the secret data thus improving the image quality.
Abstract: Data Security has been an essential area of concern as the communication medium is widely used over internet. Image steganography indicates sending the secret data in the cover image while hiding the very existence of it self. Before embedding the secret data in the cover image, it is encrypted in order to obtain better level of security. Steganalysis is concerned with field of defeating steganographic techniques. Hence continuous research has been under taken in order to enhance data security. Cryptography involves a process called encryption and is not concerned with hiding the secret data in the cover image. Visual cryptography is a renowned technique to protect data which is image based. During encryption, the image is split into ‘n’ number of shares. During decryption, these shares are stacked together to get original image. Hence specific decryption algorithm is not necessary and just human visual system would suffice. In order to enhance security mechanism, visual cryptography and image steganography are used together. Neural networks are concerned with identifying the best locations in host image in order to embed the secret data thus improving the image quality.

Proceedings ArticleDOI
Sherin Sugathan1
21 Jul 2016
TL;DR: A new algorithm for LSB (Least Significant Bit) replacement based image steganography for RGB color images is reported, with an improvement in image quality measured by means of PSNR and MSE.
Abstract: Steganography is one of the popular methods in information hiding that allows people to communicate secretly. The main advantage of image steganography is that the image within which the secret is encoded does not attract the attention of an attacker. Methods for image steganography always concentrate on maintaining the visual quality of an image while encoding a secret message in it. This paper reports a new algorithm for LSB (Least Significant Bit) replacement based image steganography for RGB color images. The directional aspects of embedding data is explored to develop an improved LSB embedding technique. The results report an improvement in image quality measured by means of PSNR and MSE.

Journal ArticleDOI
01 Oct 2016
TL;DR: This paper proposes an approach for Steganography Pattern Discovery (SPD), an evolutionary method to extract the signature of stego images against clean images via fuzzy if-then rules and results indicate that the pattern of a steganography method is extracted well and the type of steganographic method used to make a stegO image can be predicted with high accuracy.
Abstract: The goal of steganalysis algorithms is detection of stego images from clean images. Each steganography method based on its embedding mechanism puts a special pattern on the stego images. Finding this pattern in the images leads us to employ a classifier to be constructed specially for detecting stego images which are the results of a special steganography algorithm. In this paper, to have high detection accuracy, we propose an approach for Steganography Pattern Discovery (SPD). Our proposed approach employs an evolutionary method to extract the signature of stego images against clean images via fuzzy if-then rules. Based on the discovered knowledge, suitable trained models for steganalysis can be employed and stego images will be detected with high accuracy. Using SPD, we can predict the type of steganography method from a stego image. Employing SPD can enhance the approaches, which assume that a special steganography method is used. The effect of SPD before applying steganalysis methods has been investigated by some steganography and steganalysis techniques and it has been validated using some image databases. The results indicate that the pattern of a steganography method is extracted well and the type of steganography method used to make a stego image can be predicted with high accuracy.

Journal ArticleDOI
TL;DR: A review of the steganography techniques based on least significant bit (LSB) substitution and pixel value differencing (PVD) along with their respective merits is presented.
Abstract: There has been a tremendous growth in Information and Communication technologies during the last decade. Internet has become the dominant media for data communication. But the secrecy of the data is to be taken care. Steganography is a technique for achieving secrecy for the data communicated in Internet. This paper presents a review of the steganography techniques based on least significant bit (LSB) substitution and pixel value differencing (PVD). The various techniques proposed in the literature are discussed and possible comparison is done along with their respective merits. The comparison parameters considered are, (i) hiding capacity, (ii) distortion measure, (iii) security, and (iv) computational complexity.

Proceedings ArticleDOI
26 Apr 2016
TL;DR: The research designed the application of steganography using Least Significant Bit (LSB) in which the previous message is encrypted using the Advanced Encryption Standard algorithm (AES) and it can restore the previously hidden data.
Abstract: Along with advances in information technology, cybercrime techniques also increased. There are several forms of attacks on data and information, such as hackers, crackers, Trojans, etc. The Symantec Intelligence report edition on August 2012 indicated that the attacker selected the target of attacks. The type of data is valuable and confidential. The Hackers selected the target to attack or steal interest information the first and they did not just taking random from a large amount of data. This indication worried because hackers stealing the data more planned. Therefore, today many systems reinforced with various efforts to maintain data security and overcome these attacks. Necessary methods to secure electronic messages that do not fall on those who are not authorized. One alternative is steganography. Cryptography and Steganography are the two major techniques for secret communication. Cryptography converts information from its original form (plaintext) into unreadable form (cipher text); where as in steganography is the art of hiding messages within other data without changing the data to it attaches, so data before and after the process of hiding almost look like the same. There are many different techniques are available for cryptography and steganography. The cryptography suspicion against disguised message is easily recognizable, because of the message disguised by changing the original message becomes as if illegible. While further reduce suspicion steganography disguised as a message hidden in the file. The research designed the application of steganography using Least Significant Bit (LSB) in which the previous message is encrypted using the Advanced Encryption Standard algorithm (AES) and it can restore the previously hidden data. The messages in this form application and hidden text on media digital image so as not to arouse suspicion. The result of research shown the steganography is expected to hide the secret message, so the message is not easy to know other people who are not eligible.

Journal ArticleDOI
TL;DR: The novel and efficient methodology of digital image steganography that describes individuality regarding secret transmission using the adaptive circular queue least significant bits (LSBs) substitution is supplied.
Abstract: Summary The major objective of the article is to supply the novel and efficient methodology of digital image steganography that describes individuality regarding secret transmission using the adaptive circular queue least significant bits (LSBs) substitution. The data structure queue is employed dynamically in resource distribution between multiple communication recipients and once secret information transmitted asynchronously. Here, RSA cryptosystem is employed for secret information confidentiality and authentication. The result of the cryptosystem organised into various blocks. In steganography method, organise the cover image into various circular queues blocks. Dynamically adapted procedure is employed to assign secret cypher blocks to circular queues for embedding. Authorised receiver will determine the right plain text using private key in RSA decypherment. Performance analysis is evaluated by using MSE, PSNR and maximum embedding capacity. Results are higher as compared with several of existing algorithms of image steganography.

Journal ArticleDOI
TL;DR: This work proposes a new image steganographic method which is based on random selection of pixels for secret data embedding and post processing the stego-image using Hybrid Fuzzy Neural Networks and results reveal that this method can achieve an embedding capacity of 3 bits per byte with excellent stegO-image quality and high imperceptibility.

Journal ArticleDOI
TL;DR: This study presents a new algorithm for the implementation of VLSB steganography named varying index varying bits substitution (VIVBS), capable of providing variable data hiding capacity and variable key size which can be changed by changing the range of least significant bits used.
Abstract: Variable least significant bits (VLSB) steganography is a pretty powerful and secure technique for data hiding in cover images, having variable data hiding capacity, signal-to-noise ratio, peak signal-to-noise ratio, and mean square error (MSE). This study presents a new algorithm for the implementation of VLSB steganography named varying index varying bits substitution (VIVBS). The VIVBS algorithm is a very secure, high capacity, flexible, and statistically unpredictable mechanism to conceal information in cover images. The method uses a secret stego-key comprising a reference point, and variation of the number of bits to be hidden with varying indices of pixels in the cover image. The secret key adds an extra feature of security to steganography, making it much immune to steganalysis. The VIVBS algorithm is capable of providing variable data hiding capacity and variable key size which can be changed by changing the range of least significant bits used. A data hiding capacity of 43.75% with a negligible ...

Proceedings ArticleDOI
04 Mar 2016
TL;DR: Some of the research work conducted in the field of image steganography in spatial domain along with their advantages and disadvantages are summarized.
Abstract: Steganography enables user to hide confidential data in any digital medium such that its existence cannot be concealed by the third party. Several research work is being is conducted to improve steganography algorithm's efficiency. Recent trends in computing technology use steganography as an important tool for hiding confidential data. This paper summarizes some of the research work conducted in the field of image steganography in spatial domain along with their advantages and disadvantages. Future research work and experimental results of some techniques is also being discussed. The key goal is to show the powerful impact of steganography in information hiding and image processing domain.

Journal ArticleDOI
TL;DR: This paper proposes a two multi-layer security algorithm using steganography with encryption that strengthens the image security through its transmission over a wireless channel.
Abstract: The popularity of wireless multimedia applications in real life and the open nature of wireless media for access make the security of confidential multimedia over wireless channels a major task. This paper proposes a two multi-layer security algorithm using steganography with encryption that strengthens the image security through its transmission over a wireless channel. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The suitability of image as a cover medium is due to abundance of redundant bits, and bulk data capacity. The chaos based encryption algorithms are adopted in this paper. In this work a confidential image is embedded into a cover image using least significant bit steganography, and then the output stego image is encrypted using a 2-D Logistic map or 2-D chaotic Baker map. The encrypted stego image is then transmitted over a wireless AWGN channel and the reverse processes are implemented to extract the received secret image. Several experiments have been carried out to examine the suitability of the proposed algorithms for securing high sensitivity images through transmission over wireless channels at different noise levels.


Proceedings ArticleDOI
03 Mar 2016
TL;DR: Audio steganography uses different algorithms, but (LSB) least significant bit is applied in this paper, and the quality of sound is depended on the size of the audio which the user selects and length of the message.
Abstract: Steganography is the art of science dealing with hiding secret data inside image, audio, video or text files. In audio steganography; secret message is embedded in the digital sound by slightly altering the binary sequence of the sound file. Existing audio steganography software deal with WAV, AU, and even MP3 sound files. Embedding secret messages in the digital sound is usually a more difficult process than embedding messages in other forms, such as digital images. Audio steganography uses different algorithms, but (LSB) least significant bit is applied in this paper. The quality of sound is depended on the size of the audio which the user selects and length of the message.

Proceedings ArticleDOI
29 Apr 2016
TL;DR: This paper proposes a technique that provides multilayer security by integrating cryptography with steganography, which has been done in MATLAB and Stimulated results have been shown.
Abstract: Information security plays a vital role during internet communication in today's era of technology. It is one of the most challenging issues now days. It is extremely important for people committing e-transactions like online shopping, money transfer etc. Cryptography and Steganography are some of the methods that are used for secure communication. The principle of cryptography is to manipulate the information so that unintended receiver will not be able to understand however the principle of steganography is to mask the very presence of communication; it hides the existence of message. Both the techniques are widely used to prevent not deliberated receiver's attacks from unauthorized access. This paper proposes a technique that provides multilayer security by integrating cryptography with steganography. The coding has been done in MATLAB and Stimulated results have been shown.

Journal ArticleDOI
TL;DR: A coding and substitution frame for both encryption and steganography, Inspired by the central dogma that regulates the transfer of genetic information in molecular biology is introduced.
Abstract: Secure communication has always been important ever since ancient times. Both encryption and steganography are effective ways for secure communication. Inspired by the central dogma that regulates the transfer of genetic information in molecular biology, this paper introduces a coding and substitution frame for both encryption and steganography. The frame consists of three parts: the construction of the pseudo-codon table, the encoding of the original media and additional data, and the substitution. After the original media is encoded, it is substituted codon by codon according to the encoded additional data and a constructed pseudo-codon table. Hyper-chaotic systems have been used in the construction of the pseudo-codon table, the encoding of original media and additional data, and the substitution, all of which have offered more randomness and larger key space to the frame. To demonstrate the validity and efficiency of the frame, this paper offers the implementation of the frame in image encryption and in image steganography. The frame offers more security to steganography algorithms and better efficiency to encryption algorithms. Experiments and analysis demonstrate the excellent performances of the steganography and encryption schemes under the proposed frame.