Steganography is the practice of hiding information behind cover data so thatits presence remains undetected. Digital photography steganographyharnesses the capability of safeguarding communication, which is crucial innumerous contemporary applications. Steganography possesses numerousbeneficialapplications.Thesignificantadvancementincomputationalcapacityand security expertise has established it as a leader in contemporary security.The primary challenge in proposing steganography lies in balancing capacity,imperceptibility, and security, distinguishing it from other systems likeencryption and watermarking. This study presents a thorough evaluation andanalysis of novel steganography techniques. Steganography, in contrast,obscures the very existence of communication by embedding.
Introduction
1. Introduction
In modern communication, security and confidentiality are vital. Despite using secure channels like the internet and phone systems, vulnerabilities remain. Two key techniques for secure data transmission are:
Cryptography: Encrypts messages using a secret key, but may draw attention and risk interception.
Steganography: Conceals the existence of a message within multimedia (e.g., images, audio, video), making it undetectable. Combining both methods enhances data anonymity.
2. Literature Survey
Steganography has evolved to include various techniques for hiding data:
Spatial Domain Techniques (e.g., LSB):
Least Significant Bit (LSB): Modifies pixel bits, simple and efficient, but vulnerable to image manipulations like compression or filtering.
Frequency Domain Techniques:
DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform): More robust against modifications; embed data in frequency components.
Applications:
Covert communication
Embedding metadata (e.g., names, locations)
Copyright protection
3. Related Work
Classical Techniques:
Basic LSB and its edge-adaptive improvements increase security with minimal visual distortion.
Advanced Techniques:
DCT + chaotic maps and enhanced DWT improve resistance to tampering.
Audio/video steganography uses methods like spread spectrum and phase coding.
Video steganography uses motion vectors and frame redundancies.
Recent Advances:
Deep learning automates embedding/extraction and optimizes undetectability.
Blockchain enhances security and immutability.
Steganalysis tools use statistical and machine learning techniques to detect hidden data.
Reversible data hiding and adaptive fuzzy-wavelet methods improve quality and minimize distortion.
4. Steganography Techniques
Frequency Domain:
DCT: Transforms signals into frequency components.
DWT: Identifies discrete frequency components of image pixels.
Spatial Domain:
Pixel Value Differences: Embeds data using quantization tables.
Edge-Centric Techniques: Hides data in edge pixels using LSB manipulation.
Bitmap Steganography:
Uses RGB components of bitmap images to embed data in LSBs, storing security information with minimal file size increase.
5. Methodology
Proposes a simplified adaptive LSB technique for optimal embedding:
Steps:
Read pixel values and flatten the image into an array.
Prepare and encrypt the message using RC4.
Select 3-bit patterns for embedding (6th, 7th, 8th bits).
Compute error ratios to select the pattern causing minimal change.
Encryption adds security even if partial extraction occurs.
Balances data capacity and security.
Future Directions:
Integrate AI for dynamic pattern optimization.
Expand into blockchain and cloud for better security and traceability.
Improve adaptability for varying image resolutions and media formats.
Conclusion
This research\'s innovation lies in employing the adaptive pattern to executethe inverted LSB. Prior to embedding the message, the message andcontainer image bits are quantified, and the error ratio for each bitcombination is computed. Eight patterns (000 to 111) are employed to invertthe least significant bit (LSB) for each combination, comprising 2 bits plus theLSB of the container image pixels. Inverted LSB is executed. To get a reducederror ratio for each pattern. The cumulative sum of all lesser error ratios foreach pattern is calculated for every bit combination. The bit combinationyielding the minimal error ratio is selected for message embedding. Due toitsrelianceontheerrorratiomeasurement,theoptimalbitcombinationmayvary for different pairs of container images and message sizes. Testing onstandardized and less varied medical images demonstrates that thesuggested technique effectively enhances imperceptibility, as indicated byPSNR and SSIM metrics. This method can be enhanced in future research byincorporating factors to identify trends and optimize utilizing artificialintelligencetechniques.
References
[1] Ansari,A.Q.;Khan,M.E.;Pant,M.DataSecuritybySteganography:AReview, 2019.
[2] Sharma,S.;Parashar,P. SteganographyinImagesUsingLSBTechnique, 2020.
[3] Thampi,S.M.;Mukhopadhyay,S.;Moschoyiannis,S.ASurveyonImage Steganography, 2015.
[4] Changder, S.; Chakraborty, M.; Sarkar, R.Steganography Techniques and Their ApplicationsinSecurity,2001.
[5] Fridrich,J.;Goljan,M.;Du,R.DetectingLSBSteganography in ColorandGray Scale Images, 2001.
[6] Rustad, S.;Setiadi, D.R.I.M.; Syukur, A.; Andono, P.N.Inverted LSB ImageSteganography Using Adaptive Pattern to Improve Imperceptibility.
[7] Chandramouli, R.; Kharrazi, M.; Memon, N. Image SteganographyandSteganalysis:Concepts andPractice,2004.
[8] Cheddad,A.;Condell,J.;Curran,K.;McKevitt,P.DigitalImageSteganography:SurveyandAnalysisofCurrentMethods, 2010.
[9] Kharrazi,M.;Sencar,H.T.;Memon,N. ImageSteganography:Conceptsand Practice, 2006.
[10] QianShen, Tao Jiang, Yongjun Zhu, Yin Wu. An Improved ImageSteganography Scheme Based on Partial Preservation EmbeddingAlgorithmforWirelessVisualSensorNetworks,2021.
[11] Abbas Cheddad Joan Condell Kevin Curran Paul Mc Kevitt . DigitalImageSteganography:SurveyandAnalysisofCurrentMethods,2010.
[12] Sarita Gulia, Saurabh Mukherjee & Tanupriya Choudhury. AnExtensiveLiteratureSurveyonMedicalImageSteganography,2016.
[13] Donghui Hu, Yu Zhang, Cong Yu, Jian Wang, Yaofei Wang. Image Steganography BasedonStyleTransfer,2022.
[14] Kirti D. Nagpal, Prof. D. S. Dabhade. A Survey on ImageSteganography&ItsTechniquesinSpatial&Frequency Domain,2015.
[15] P. Haridas, G. S. Prajapati, \"A Combined Approach ofSteganography and Cryptography Techniques for Information Security: ASurvey\" (International Journal of Engineering Research & TechnologyISSN: 2278-0181 vol 4 Issue 12, December 2015)