Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Ms. T N Aruna , L R Nandika , C I Sneha, Timothy Jerald Xavier, Treesa Mary George
DOI Link: https://doi.org/10.22214/ijraset.2023.51091
Certificate: View Certificate
Steganography refers to the concealment of confidential data within a common medium, like a text, image, or audio file, without altering its original appearance, to evade detection. This method is used for several purposes, including protecting data privacy, preventing unauthorized access to data, and ensuring safe information transmission over insecure networks. While steganography can be used for legitimate purposes such as by military, law enforcement, and journalism, it can also be employed for malicious activities like cybercrime and terrorism. The least significant bit (LSB) of each letter in text & audio and the LSB of each pixel in images are altered in steganography to make the alterations invisible. Advanced steganography algorithms like Masking & Filtering and Encrypt & Scatter have improved security against steganalysis assaults while producing higher-quality stego images. The method’s capability for concealing text with an unlimited hidden text size in text, audio, and images will be employed in the outcome.
I. INTRODUCTION
Steganos a Greek word, which means covered or concealed, and graphy which means writing or drawing, are the roots of the word "steganography". The art of steganography involves hiding the presence of information within seemingly innocent carriers. Steganography, in its broadest meaning, refers to the process of concealing messages within images. More specifically, the purpose of steganography is to conceal communications among other, unimportant messages in such a way that no adversary can even tell that a second secret message is present.
Today, steganography is widely used in digital communication to ensure the security and privacy of sensitive information. The main advantage of steganography is that it allows messages to be hidden in plain sight, without arousing suspicion. Steganography techniques involve modifying the least significant bits of the pixels in an image or the samples in an audio file.
These modifications are usually imperceptible to the human eye or ear and do not significantly alter the overall quality of the medium.
The hidden message can only be retrieved by someone who knows where to look and how to extract it. Steganography is often used in combination with cryptography to provide an additional layer of security. Cryptography involves scrambling the message using mathematical algorithms so that it can only be read by someone who has the correct key. Steganography, on the other hand, ensures that even if the message is intercepted, it cannot be detected without prior knowledge of its existence. This combination of techniques makes it extremely difficult for an attacker to intercept and decipher the message, even if they have access to the medium in which it is hidden
II. METHODOLOGY
A. Text Steganography
Text steganography involves the concealment of confidential messages within the plain text, without the awareness of unintended recipients. In order to produce readable texts, it is essential to do things like changing the format of the preexisting text, altering the words within a text, creating random character sequences, or using a context-free grammar. Various methods include the following to conceal the data in the text:
B. Audio Steganography
Audio steganography is the practice of hiding secret information within audio files in a way that is imperceptible to human ears. This technique involves modifying the audio signal in such a way that the hidden message is embedded within the audio file without affecting its perceptual quality. Audio steganography can be implemented using various methods, such as modifying the least significant bits (LSBs) of the audio samples, altering the amplitude or phase of specific audio segments, or using spread spectrum techniques to distribute the hidden message across multiple audio samples. The primary goal of audio steganography is to ensure that the hidden message remains confidential and secure while being transmitted across public channels. Audio steganography is used in various applications, including audio watermarking for copyright protection, audio surveillance for law enforcement, and secure communication for military and intelligence purposes.
C. Image Steganography
Image steganography is a technique of hiding secret information or data within an image. The aim of image steganography is to conceal the existence of the secret message within the image, making it undetectable by unauthorized viewers. The process involves selecting an image as a cover object and embedding a message within it by modifying the pixels in a specific way. The modifications made to the image are usually very subtle and do not visibly affect the image's appearance. The hidden message can be extracted using a decoding algorithm or software, which is designed to recover the original message from the modified image. Image steganography has various applications, including information security, digital watermarking, and copyright protection. However, it can also be used maliciously, making it crucial to be aware of its existence and possible uses.
The filtering process is used to create a mask that will be applied to the message before embedding it in the cover image. The aim of these techniques is to make the embedded message undetectable by the human eye and difficult to detect by image processing algorithms. The hidden message can be extracted by reversing the process and applying the appropriate filters or masks to the image. These techniques are useful for ensuring message security in scenarios where the cover image cannot be modified, such as when the image is already distributed or publicly available.
???????
In conclusion, text, image, and audio steganography are powerful techniques that can be used to hide sensitive information from prying eyes. These techniques are widely used in different fields such as national security, digital forensics, and digital rights management. Text steganography is relatively simple, but it is also easily detectable. Image steganography is more complex and offers better security, but it also requires more resources to implement. Audio steganography, on the other hand, is even more secure than image steganography but is also more complex and resource-intensive. Therefore, the choice of which technique to use will depend on the level of security required, the resources available, and the specific needs of the user.
[1] Samruddhi Deshmukh, Mitalee Manware, Radhika Chhablani, Shweta Meshram (A Review Paper on Text steganography - July 2022 International Journal of Research in Engineering and Science) [2] Muhammad Adnan Aslam, Muhammad Rashid, Farooque Azam, Muhammad Abbas, Yawar Rasheed, Saud S. Alotaibi, Muhammad Waseem Anwar (Image Steganography using Least Significant Bit (LSB) - A Systematic Literature Review - January 2022 2nd International Conference on Computing and Information Technology) [3] Amitava Podder, Piyal Roy, Smaranika Roy (Steganography Techniques - An Overview - November 2022 International Journal of Scientific Research in Computer Science Engineering and Information Technology) [4] Vivek Sharma S, Monika Raj, Swathi S (A Survey of Text Steganography Methods - May 2021 International Journal of Scientific Research in Science and Technology) [5] Rini Indrayani (Modified LSB on Audio Steganography using WAV Format - January 2021 3rd International Conference on Information and Communications Technology) [6] R Shanthakumari, E M Roopa Devi, R Rajadevi, B Bharaneeshwar (Information Hiding in Audio Steganography using LSB Matching Revisited - May 2021 Journal of Physics Conference Series) [7] Nandhini Subramanian, Omar Elharrouss, Somaya Al-Maadeed, Ahmed Bouridane (Image Steganography: A Review of the Recent Advances - January 2021 IEEE) [8] Pranati Rakshit, Sreeparna Ganguly, Souvik Pal, Ayman A. Aly, Dac-Nhuong Le (Securing Technique Using Pattern-Based LSB AudioSteganography and Intensity-Based Visual Cryptography - November 2020 Computers, Materials and Continua 67(1):1207-1224) [9] Olawale Timothy Adeboje, Arome Junior Gabriel, Adebayo Olusola Adetunmbi (Development of an Audio Steganography System Using Discrete Cosine Transform and Spread Spectrum Techniques - September 2020 International Conference on Computational Science and Its Applications) [10] Sonali K. Powar, H.T. Dinde, Radhika.M. Patil (A Study and Literature Review on Various Image Steganography Techniques - August 2020 International Research Journal of Engineering and Technology)
Copyright © 2023 Ms. T N Aruna , L R Nandika , C I Sneha, Timothy Jerald Xavier, Treesa Mary George. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET51091
Publish Date : 2023-04-26
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here