Analysis of various data security techniques of steganography: A survey

被引:42
|
作者
Dhawan, Sachin [1 ]
Gupta, Rashmi [1 ]
机构
[1] Ambedkar Inst Adv Commun Technol & Res, Dept Elect & Commun Engn, New Delhi, India
来源
INFORMATION SECURITY JOURNAL | 2021年 / 30卷 / 02期
关键词
Steganography Least Significant bit; pixel value difference; gray-level modification; quantization index modulation; discrete wavelet transform; discrete cosine transform; HIGH-CAPACITY STEGANOGRAPHY; LEAST SIGNIFICANT BIT; DATA HIDING SCHEME; IMAGE STEGANOGRAPHY; VIDEO STEGANOGRAPHY; ALGORITHM; DISTORTION; CRYPTOGRAPHY; INFORMATION; NETWORKS;
D O I
10.1080/19393555.2020.1801911
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs their data to be safe during the process of communication. Steganography is the process of hiding a message, audio, image, or video by embedding it into another image, audio, message, or video. It is employed to protect secret data from malicious attacks. This paper presents a categorization of the steganography based on technical and non-technical steganography and also categorized based on its domain. Issues related to steganography are quality of stego images, payload capacity, mean square error, structural similarity (SSIM), Image Fidelity (IF), and Normalized Cross-Correlation (NCC) and robustness. Researchers have already done commendable research in the area of image steganography. Still, it is important to feature the upsides and downsides of the current systems of steganography. The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness. Based on the analysis of these parameters and all the issues, this paper concludes with recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of steganography.
引用
收藏
页码:63 / 87
页数:25
相关论文
共 50 条
  • [1] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [2] A Literature Survey on various Image Encryption & Steganography Techniques
    Dahiya, Madhu
    Kumar, Raman
    [J]. 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 310 - 314
  • [3] Security analysis of DNA based steganography techniques
    Al-Harbi, Omnia Abdullah
    Alahmadi, Walaa Essa
    Aljahdali, Asia Othman
    [J]. SN APPLIED SCIENCES, 2020, 2 (02)
  • [4] Security analysis of DNA based steganography techniques
    Omnia Abdullah Al-Harbi
    Walaa Essa Alahmadi
    Asia Othman Aljahdali
    [J]. SN Applied Sciences, 2020, 2
  • [5] An In-depth Analysis of Various Steganography Techniques
    Dhall, Sangeeta
    Bhushan, Bharat
    Gupta, Shailender
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 67 - 94
  • [6] A Survey on Cloud Data Security using Image Steganography
    Albalawi, Afrah
    Hamza, Nermin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 645 - 649
  • [7] Analysis of Different Text Steganography Techniques : A Survey
    Sharma, Shivani
    Gupta, Avadhesh
    Trivedi, Munesh Chandra
    Yadav, Virendra Kumar
    [J]. 2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 130 - 133
  • [8] A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks
    Kumar, Mukesh
    Dutta, Kamlesh
    [J]. INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, 2015, 309 : 1 - 15
  • [9] The Survey of Various Techniques & Algorithms for SMS Security
    Karale, Shraddha N.
    Pendke, Kalyani
    Dahiwale, Prashant
    [J]. 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [10] A Survey on different techniques of steganography
    Kaur, Harpreet
    Rani, Jyoti
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN ENGINEERING & TECHNOLOGY (ICAET-2016), 2016, 57