Using steganography for securing data, not concealing it. It is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of. Steganography is the dark cousin of cryptography, the use of codes. Here in this paper a survey of all the existing image steganography techniques are discussed with their various advantages and limitations. Many different image file formats exist, most of them for specific applications. Advantages the amount of information to be hided in this. A detailed discussion about lsb could be found in 14623.
Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The simplest of lsb steganography techniques is lsb replacement for all pixels of image10. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own. When dealing with digital images for use with steganography, 8bit and 24bit per pixel image files are typical. However, text steganography is considered to be the most difficult kind of steganography due to lack of redundancy in text as compared to image or audio but still has smaller memory occupation and simpler communication. Steganography in images using lsb technique arun kumar singh. Steganography can be applied to different types of media including text, audio, image and video etc. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. On the other hand, compound documents using opaque formats, like microsoft compound document file format, may contain undisclosed data such as authors name, organizational information of users involved, previously deleted text, machine related information, and much more. Using the lsb technique, which facilitates plain text hiding in an image as well as hiding files in an image.
Using kolmogorov complexity for understanding some limitations on steganography. In broad explanation, the steganography is mainly used for hiding the information within the images. Advantages and disadvantagesof steganography answers. Analysis of image steganography methods information. Question 1 a what is the difference between an unconditionally secure cipher and a computationally secure cipher. Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of the hidden message. Multiple image steganography using lsbdct technique.
Cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the internet. The drawback is that only 256 possible colors can be used which can be a potential problem during encoding. Digital image are the most popular and frequency used on the internet. Video steganographyvideo steganography is a technique to hide any kind of files in any extension into a carrrying video file. This method is very fast and easy to implement in comparison to other methods of image steganography.
Cryptography, steganography and perturbation technique. The use of block dct can result in blocking artifacts in the stegovideo. An evaluation of image based steganography methods. The purpose of steganography is to maintain secret communication between two parties. The only real advantages of using java for steganography is that it has built in support for reading and storing various image types probably the most common medium used for steganography. Image can be made available in any desired formats like black and white, negative image, disadvantage. Let us discuss one by one with pros and cons of each one. All the information contained in a plaintext document are visible to everybody. The types and techniques of steganography computer science. There are many steganography techniques with different kind of container. Analysis of image steganography methods information technology essay abstract. By making some slight changes to color values, for example, you can transmit a few bits here and there that are practically undetectable.
Overview of steganography to provide an overview of steganography, terms and concepts should first be explained. Image steganography techniques can be classified according to various criteria. Instead of embedding the message in only the lsb, we can embed the message in last two lsbs, thus embedding even large messages. This paper presents a survey of popular image steganography techniques and also discusses their advantages, limitations and effectiveness in comparision. Both have advantages and disadvantages, 8bit images are useful because of their relatively small size. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both. Study on image steganography techniques semantic scholar. Steganography includes the concealment of information within computer files. Steganography has some pretty standard advantages and disadvantages. Advantage of image steganography instead of using simply encrypted text is that. The output image has very slight difference to the input image. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Spatial domain technique i image quality is not changed for any algorithm that uses spatial method.
In this study we analyse how image steganography is done, where it is used and the advantages and disadvantages of each technique. Pros and cons of cryptography, steganography and perturbation techniques. The basics of image steganography, factors for evaluating an image steganography are covered in the paper. The capacity of the technique to hide the data should be well achieved. Advantages of lsb are the picture quality of cover image is hardly affected. Both have advantages and disadvantages 8bit images are a great format to use because of their relatively small size. Okay, i will try to answer your question in very simple terms by using an example. Study image steganography techniques information technology essay abstract steganography is a method of secret communication that hides the existence of secret data. While cryptography provides privacy, steganography is intended to provide secrecy. When users use fingerprint recognition system to verify their identification, a minutiae image is brought out and compared with the one which provided at the time of access. Since only lsb is changed, difference between the cover i. Steganography is a method of covertly communicating. Audio steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as audio file.
Plainly visible encrypted messagesno matter how unbreakablewill arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. What are the advantages of steganography over cryptography. Provide an example of how steganography was used in the past and an example of. Section 2 gives the reader an overview of steganography in general and differentiates. This reflection is based on a set of criteria that we have identified for image steganography. The message i used was a 1bit image of equal size to the cover image, but this technique can be used for messages of any length up to 3nm in a n by m color image. Media files are ideal for steganographic transmission because of their large size. It can be passed in innocuous content like an image. Digital image steganography concept and evaluation citeseerx. In this paper we mainly discuss different types of audio steganographic methods, advantages and disadvantages.
In this article we consider the main image steganography techniques and those advantages and disadvantages. One of the major discoveries of this investigation was that each steganographic implementation carries with it significant tradeoff decisions, and it is up to the steganographer to decide which implementation suits himher best. Usually steganography is implemented using some cover medium which include an image, audio or video. L kdyh d vhfuhw now what do you see it looks different, not normal. Pdf pros and cons of cryptography, steganography and. Also, there are a wide variety of different techniques with their own advantages and disadvantages were constructed in steganography.
The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. A novel steganography algorithm for hiding text in image. Steganography is useful for hiding messages for transmission. The advantages are that the hidden text doesnt stand out.
Foreground pixels of cover image foreground pixels of. Pdf cryptology was as significant as weapons during the world war ii and the cold war. Each image has its own advantages and disadvantages. It is simple, susceptible to lossy compression and image manipulation. Steganography is the technique of concealing information within seemingly innocuous carriers. Also attempt to identify the requirements of a good steganography algorithm. Other advantages of lsb data hiding included high embedding capacity and low computational complexity. Data hidden in images using this method is highly sensitive to image alteration and vulnerable to attack. Cryptography is the science of writing in secret code and is an ancient art14. Character arrangement noncryptographic wax coverings.
What are the advantages and disadvantages of using steganography. The main disadvantages are the weaknesses with respect to robustness, tampering, geometric attacks, filtering, and compression. Advantages it is used in the way of hiding not the information but the password to reach that information. Image steganography with compression using integer. Pdf digital image steganography concept and evaluation. What are the advantage of steganography over cryptography.
Steganography is a data hiding technique where the 3rd party would be completely ignorant about any hidden information. Pdf in the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. Steganography provide a secure form of communication. Provide an example of an unconditionally secure cipher.
Keyword steganography, cryptography, audio steganography, lsb. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. The term steganography is taken from the greek language and it means the covered writing, it is an art of hiding the data within the innocuous carriers. Hence on the basis of their various advantages and limitations a new and efficient image steganography is implemented in future. Steganography is beneficial for securely storing sensitive data, such as hiding system passwords or keys within other files. Steganographic system there are different steganographic techniques 4 each with their own advantages and disadvantages 5, 6, 7. Image of a tree with asteganographicallyhidden image. In section 3 the most popular algorithms for image steganography are discussed and compared in section 4. Alice and bob can exchange messages of a certain kind called covertexts over. It can be plain text, ciphertext, other image, or anything that can be. This paper intends to give an overview of different image steganography techniques along with its advantages and disadvantages keywords neural network. Lsb based image steganography using matlab geeksforgeeks. What are the advantages and disadvantages of steganography.
Steganography is a method for secret communication that hides the existence of secret data. In this paper, the secret image is hidden in cover image using. The goal of steganography can be described as follows. The effective steganography should have property of remaining intact irrespective of the tampering, the secret message should be invisible and it should go undetected. It works with jpeg and png formats for the cover image and always creates png stego image due to. It can be defined as the study of invisible communication that usually deals with the. An overview of the different kinds of steganography is given at a later stage. The remainder of the paper is structured as follows. What are the advantages of steganography over cryptography system. No techniques advantages disadvantages 1 spatial domain technique i image quality is not changed for any algorithm that uses spatial method. Here different types of techniques for data hiding and securing information are described with their advantages and disadvantages.
1300 42 1048 460 1336 1308 1158 25 389 1236 603 953 702 1227 1209 585 557 555 81 883 634 127 1223 775 743 1077 1141 913 86 204 1410 26 449