Evaluation of Best Steganography Tool using Image Features

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-50 Number-1
Year of Publication : 2017
Authors : Jensi Lakdawala, Jiya Rankawat
DOI :  10.14445/22312803/IJCTT-V50P108


Jensi Lakdawala, Jiya Rankawat "Evaluation of Best Steganography Tool using Image Features". International Journal of Computer Trends and Technology (IJCTT) V50(1):50-58, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Steganography is technique of hiding a data under cover media using different steganography tools. Image steganography is hiding of data (Text/Image/Audio/Video) under a cover as Image. This review paper presents classification of image steganography and the comparison of various Image steganography tools using different image formats. The attainment of this study is to identify the reliable and best tool available in the market for Steganography. Analysing numerous tools on the basis of Image features and extracting the best one is the main goal of this paper.

[1] Monica Adriana Dagadita, Emil-Ioan Slusanschi, & Razvan Dobre, "Data Hiding Using Steganography ", IEEE 12th International Symposium in Parallel and Distributed Computing, pp. 159-166, 2013.
[2] G.Prabakaran & R.Bhavani, "A modified secure digital image steganography based on Discrete Wavelet Transform", IEEE International Conference In Computing, Electronics and Electrical Technologies (ICCEET), pp. 1096-1100, 2012.
[3] D.R. Denslin Brabin, Dr.V.Sadasivam, ?QET Based Steganography Technique for JPEG Images, IEEE International Conference on Control, Automation, Communication and Energy Conservation, ISBN 978-1- 4244-4789-3, 2009.
[4] Abbas Cheddad, Joan Condell, Kevin Curran and Paul McKevitt, A Comparative Analysis of Steganographic Tools, School of Computing and Intelligent Systems, Faculty of Engineering University of Ulster. Londonderry, Northern Ireland, United Kingdom.
[5] Ismail Karadogan, Resul Das, An Examination on Information Hiding Tools for Steganography, INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Resul Das et al., Vol. 3, No.3.
[6] Hamad A. Al-Korbi1, Ali Al-Ataby2, Majid A. Al-Taee3 and Waleed Al-Nuaimy4, ?HIGHLY EFFICIENT IMAGE STEGANOGRAPHY USING HAAR DWT FOR HIDING MISCELLANEOUS DATA, Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 2, No. 1, April 2016.
[7] Monika and Er. Mohinder Singh, ?A survey on image based steganography framework to enhance quality of payload object, International Journal of Engineering Research and General Science Volume 4, Issue 2, March- April, 2016.
[8] L.Baby Victoria*, Dr.S.Sathappan, ?A Study on Spatial Domain and Transform Domain Steganography Techniques used in Image Hiding, INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN: 2045-8711) ,VOL.5 NO.5 MAY 2015.
[9] Don Caeiro1, and Sanjana S2, ?Detection of Steganography using Metadata in Jpeg Files, The International Journal of FORENSIC COMPUTER SCIENCE, IJoFCS (2015) 1, 23-28.
[10] D.Venkata Ramana, P.Nageswara Rao, ?Steganography Algorithms for Image Security Using LSB Substitution Method?, International Journal of Modern Embedded System (IJMES), Volume No.-4, Issue No.-1, February, 2016.
[11] Arnold, M. K., Schmucker, M., & Wolthusen, S.D. (2003). Techniques and Applications of Digital Watermarking and Content Protection. Artech House, Norwood, Massachusetts.
[12] Joachim, J., Eggers, J. & Bernd, G. (2000). Robustness of a blind image watermarking scheme. ICIP 2000, Special Session on WM. Sep. 10–13. Canada.
[13] Stefan, W., Elisa, D. & Gelasca, T. (2002). Perceptual quality assessment for video watermarking. Proceedings of International Conference on Information Technology: Coding and Computing (ITCC). April 8-10. Las Vegas, NV.
[14] Wu, N. (2004). A Study on Data Hiding for Gray-Level and Binary Images. Master Thesis. Chaoyang University of Technology, Taiwan. [5] Bennour J. Dugelay J. L. & Matta, F. (2007). Watermarking Attack: BOWS contest. Proceedings of SPIE.
[15] Mehdi Hussain and Mureed Hussain, ?A survey on Image steganography Techniques?, International Journal of Advance Science and Technology Vol. 54, May, 2013.
[16] Sakshi Jindal, Navdeep Kaur, ?DIGITAL IMAGE STEGANOGRAPHY SURVEY AND ANALYSIS OF CURRENT METHODS?, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol.6, No3, May-June 2016.
[17] T. Morkel 1 , J.H.P. Eloff 2 , M.S. Olivier 3, ?AN OVERVIEW OF IMAGE STEGANOGRAPHY?, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science. [18] Islam, S., Modi, M.R. & Gupta, P. , Edge-based image steganography, EURASIP Journal on Information Security , December 2014, 2014:8.
[19] Taras Holotyak1, Jessica Fridrich1 , Sviatoslav Voloshynovskiy2, ?Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics, Department of Electrical and Computer Engineering, State University of New York at Binghamton, Binghamton, NY, 13902-6000.
[20] Natarajan Meghanathan1 and Lopamudra Nayak2, ?STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA, International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010.
[21] Suhad shakir jaber, hilal adnan fadhil, zahereel i. Abdul khalib, rasim azeez kadhim, SURVEY ON RECENT DIGITAL IMAGE STEGANOGRAPHY TECHNIQUES, Journal of Theoretical and Applied Information Technology 31st August 2014. Vol. 66 No.3.
[22] Rajesh Kumar Tiwari and Gadadhar Sahoo, ?Some New Methodologies for Image Hiding using Steganographic Techniques.
[23] Ms. Tejashree Shinde1, Ms. Ujwala Chaudhari2, Ms. Rushali Bodke3, ?Image Steganalysis Based on Statistical Evidance by Using SVM, International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 2, February 2014.
[24] Huan Dou, Zhipin Deng, Kebin Jia, ?A Fast Macroblock Mode Decision Algorithm for MVC Based on SVM, Dept. of Electronic Information & Control Engineering, Beijing University of Technology, Beijing, Chin.
[25] Sunny Dagar, ?Highly randomized image steganography using secret keys, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE) , pp. 1-5, 2014.
[26] K.A. Darabkh, I.F. Jafar, R.T. Al-Zubi, & M. Hawa, ?An improved image least significant bit replacement method, IEEE 37th International Convention in Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp 11821186, 2014.
[27] Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr. "A Steganographic Method Based on DCT and New Quantization Technique". International Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014.
[28] Amandeep Kaur, Rupinder Kaur , Navdeep Kumar , " A Review on Image Steganography Techniques ", International Journal of Computer Applications (0975 – 8887) Volume 123 – No.4, August 2015.
[29] Reddy, H. S. M., & Raja, K. B. (2009). High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security (IJCSS), 3(6), 462-472.
[30] Amrita Khamruia , J K Mandal. "A Genetic Algorithm based Steganography using Discrete Cosine Transformation (GASDCT)". Procedia Technology 105 – 111.
[31] https://www.youtube.com/watch?v=7KSn_nekots
[32] https://www.slideshare.net/IJMER/en2646344638
[33] http://in.mathworks.com/help/images/ref/imshowpair.html
[34] https://www.slideshare.net/PrimaLCarnagE/dct-steg-o-group-1
[35] http://shodhganga.inflibnet.ac.in/bitstream/10603/8912/13/11_chapter%202.pdf
[36] http://www.codeforge.com/s/1/Image-steganography-using-DCT-algorithm-in-MATLAB
[37] http://en.pudn.com/downloads74/sourcecode/crypt/ca/detail267155_en.html
[38] http://read.pudn.com/downloads74/sourcecode/crypt/ca/267155/Steganography/
[39] http://en.pudn.com/downloads74/sourcecode/crypt/ca/detail267155_en.html
[40] https://in.mathworks.com/help/images/image-quality.html
[41] http://softasm.com/matlab-r2016-crack-full-windows-mac/
[42] https://www.searchenginejournal.com/7-similarity-based-image-search-engines/8265/
[43] https://www.searchenginejournal.com/google-neven-vision-image-recognition/3728/
[44] http://www.garykessler.net/library/ndaa_stego.html
[45] http://ws2.binghamton.edu/fridrich/Research/f5.pdf
[46] https://www.slideshare.net/WXavierP/computer-forensics-and-steganography
[47] http://resources.infosecinstitute.com/steganography-and-tools-to-perform-steganography/
[48] https://en.wikipedia.org/wiki/Steganography

Information hiding, Cryptography, Steganography, Steganography tools.