SlideShare a Scribd company logo
A Survey Paper on Different Steganography
Techniques
Shashikant Singh 1
, Seema Yadav 2
, Ankur Raj3
and Priya Gupta4
Assistant Professor
JECRC,Jaipur,Rajasthan,India
shashikant.cse@jecrc.ac.in1
, seemayadav.cse@jecrc.ac.in2
, ankurraj.cse@jecrc.ac.in3
,
priyagupta.cse@jecrc.ac.in4
Abstract
With the rapid advance in digital network, information technology, digital libraries, and
particularly World Wide Web services, many kinds of information could be retrieved
any time. So in this digital scenario invisible communication between two parties is the
prime concern. Steganography is the technique of hidden communication. It not only
hides the message contents, instead it hides the existence of the message. In this paper, a
new image steganography method based on spatial domain is proposed secret data hided
in image segments using least significant bit (LSB) steganography is proposed. The
color image is divided into four equal parts and the secret data is also divided into four
equal parts and those divided data is hided in the image segments using least significant
bit steganography. In this paper we have critically analyzed various steganographic
techniques and also have covered steganography overview its major types,
classification, applications.
Keywords: Steganography, least significant bit, Spatial Domain, MSE, PSNR, NC.
I. Introduction
1. The advancement in digital technology with the advent of computers and internet technology
has brought a revolution by transforming the world into a digital village. Some illegal eavesdroppers
every time try to hack that secret data. For providing security to this secret data in digital medium
there are various techniques are available[1]. Like Cryptography, Steganography, Digital
watermarking etc. Basically Steganography word is derived from two Greek words “Stegos” and
“Grafia” i.e. Steganographic, where Stegos means covered and Grafia means writing it means covered
writing. In this technique secret message is concealed inside a cover object. There are different types
Kalpa Publications in Engineering
Volume 2, 2018, Pages 103–108
Proceedings on International Conference on Emerg-
ing Trends in Expert Applications & Security (2018)
V.K. Chandna, V.S. Rathore and S. Maheshwari (eds.), ICETEAS 2018 (Kalpa Publications in Engineering,
vol. 2), pp. 103–108
of Steganography Techniques are available based on the cover object. Cover Objects can be image,
Audio, Video, Protocols etc. The secret information can be embedded in various types of covers. If
information is embedded in a cover text (text file), the result is a stego-text object. Similarly, it is
possible to have cover audio, video and image for embedding which result in stego-audio, stego-video
and stego-image respectively. The proposed paper provide a systematic survey of existing
Steganography research by categorizing existing methods according to the certain features and
analysing the advantages of these features. The motive of the paper is to provide researchers with
in-depth study of subject.
1.1 CLASSIFICATIONS OF DIGITAL STEGANOGRAPHY
Steganography can be classified according to its importance and goals. So different types of
steganography are as follows:
a) Linguistic steganography: Linguistic steganography is concerned with hiding information
in natural language text. One of the major transformations used in linguistic
steganography is synonym substitution [2]. However, few existing studies have studied
the practical application of this approach.
Fig.1. Types of Steganography[2]
b) Semagrams: It uses only symbols and signs to hide the information. It is further categorized into
two ways:
i) Visual Semagrams: A visual semagrams uses physical objects used every day to convey
a message. For example: the positioning of items on a particular website.
ii) Text Semagrams: This type is used to hides a message by modify the appearance of the
carrier text, or by changing font size and type, or by adding extra space between words
and by using different flourished in letters or handwritten text[3].
c) Image Steganography: Taking the cover object as image in steganography is known as image
steganography. Generally, in this technique pixel intensities are used to hide the information.
d) Network Steganography: When taking cover object as network protocol, such as TCP,UDP,
A Survey Paper on different Steganography Techniques S. K. Singh et al.
104
ICMP, IP etc, where protocol is used as carrier, is known as network protocol steganography. In the
OSI network layer model there exist covert channels where steganography can be achieved in unused
header bits of TCP/IP fields[4&5]..
e) Video Steganography: Video Steganography is a technique to hide any kind of files or information
into digital video format. Video (combination of pictures) is used as carrier for hidden information.
f) Audio Steganography: When taking audio as a carrier for information hiding it is called audio
steganography. It has become very significant medium due to voice over IP (VOIP) popularity. Audio
steganography uses digital audio formats such as WAVE, MIDI, AVI MPEG or etc for
steganography[6].
g) Text Steganography: General technique in text steganography, such as number of tabs,white
spaces, capital letters, just like Morse code and etc is used to achieve information hiding.
Fig.2. Block diagram of Image steganography[4]
II.LSB Method:
In LSB steganography, the least significant bits of the cover media’s digital data are used to conceal
the message. The simplest of the LSB steganography techniques is LSB replacement. LSB
replacement steganography flips the last bit of each of the data values to reflect the message that
needs to be hidden[7]. Consider an 8-bitgrayscale bitmap image where each pixel is stored as a byte
representing a gray scale value. Suppose the first eight pixels of the original image have the following
gray scale values.
11010010 01001010 10010111 10001100
00010101 01010111 00100110 01000011
To hide the letter C whose binary value is 10000011, we would replace the LSBs of these pixels to
have the following new grayscale values:
11010011 01001010 10010110 10001100
00010100 01010110 00100111 01000011
In the above example only half the LSBs need to change. [12] The difference between the cover (i.e.
A Survey Paper on different Steganography Techniques S. K. Singh et al.
105
original) image and the stego image will be hardly noticeable to the human eye. However, one of its
major limitations is small size of data which can be embedded in such type of images using only LSB.
LSB is extremely vulnerable to attacks. LSB techniques implemented to 24 bit formats for the color
image are difficult to detect contrary to 8 bit format[8]. It is observed that there are little differences in
the histograms of cover and stego image of Lena. For other images, similar characteristics are
obtained.
Fig.3. Cover and Stego Images of Halena: (a) Cover Image and RGB Histograms (b) Stego Image and RGB
Histogram[3]
From above experimental results, it is apparent that each stego-image is almost analogous to
corresponding cover image and shows better imperceptibility. That is, deterioration of the quality of
images due to the embedding of the secret messages cannot be distinguished.
III. ADVANTAGES
Steganography has unique advantages for net-espionage agents. Even if a file is known or suspected
to contain Steganographic software, it is almost impossible to extract the information until the correct
password is obtained. Steganography is beneficial for securely storing sensitive data, such as hiding
system passwords or keys within other files[9]. In places where standard cryptography and encryption
is outlawed, Steganography can be used for covert data transmission.
IV. CONCLUSION
Steganography is the art and science of writing hidden messages in such a way that no one, apart from
the sender and intended recipient, suspects the existence of the message. It is therefore a book on
magic. It is emerging in its peak because it does not attract anyone by itself [24].In this paper, analysis
of Global Journal of Computer Science and Technology Volume XIII Issue IV Version I 13 ( ) Year
A Survey Paper on different Steganography Techniques S. K. Singh et al.
106
013 2 F © 2013 Global Journals Inc. (US) A Review of Comparison Techniques of Image
Steganography LSB, DCT & DWT methods has been successfully implemented and results are
delivered. The MSE and PSNR of the methods are also compared and also this paper presented a
background discussion and implementation on the major algorithms of steganography deployed in
digital image[10].
V . FUTURE SCOPE
Still efforts have to be made to increase the embedding capacity and maintain secrecy. In this method
we can hide text file equal to the size of the image. Efforts can be made to hide text files having more
size than image size. The secret keys have to be known to both sender and receiver. Keys are not sent
in cover-images but are distributed separately. A technique can be evolved so that these keys can be
generated and distributed covertly. The Transform Domain method can be utilized if more security is
required[11]. If Steganography is used with Cryptography, it will prove to be an unbeatable tool in
secure communication links. Security of the scheme can be improved by using advanced
cryptography techniques and also improve the efficiency by using data compression techniques.
References:
[1]. A. A. Ali and A. H. Seddik, “Image Steganography Technique By Using Braille Method of Blind
People (LSBraille)”, International Journal of Image Processing (IJIP), Vol. 7, Issue 1,PP. 81-89, 2013.
[2] A. Ahmed, N. Agrawal, and S. Banerjee, “Image steganography by closest pixel-pair mapping”,
IEEE- International Conference On Computing, Communications and Informatics (ICACCI), PP.
1971 - 1975, 24-27 Sept. 2014.
[3] A. Nag, S. Ghosh, S. Biswas, D. Sakar, and P.P. Sakar, “An Image Steganography Technique
using X-Box Mapping”, IEEE- International Conference On Advances In Engineering, Science and
Management(ICAESM-2012), Vol. 3, Issue 12, PP. 709-713, March 2012.
[4] A. A. Ali and A. H. Seddik, “New Image Steganography Method By Matching Secret Message
With Pixels Of Cover Image (SMM)”, International Journal of Computer Science Engineering and
Information Technology Research (IJCSITR), Vol. 3, Issue 2 ,PP. 1-10, Jun 2013.
[5] S. Nazari, A-M. Eftekhari, and M. Sh. Moin, “Secure Information Transmission using
Steganography and Morphological Associative Memory”, International Journal of Computer
Applications, Vol. 61, No. 7, PP. 23-29, January 2013.
[6] K.Thangadurai and G.Sudha Devi, “An analysis of LSB based image Steganography techniques,”
Computer Communication and Informatics (ICCCI), International Conference on 3-5 Jan. 2014, pp.1
– 4, Publisher: IEEE.
A Survey Paper on different Steganography Techniques S. K. Singh et al.
107
[7] Amritpal Singh and Harpal Singh, “An improved LSB based image Steganography technique for
RGB images,” Electrical, Computer and Communication Technologies (ICECCT), IEEE International
Conference on 5-7 March 2015, pp. 1- 4.
[8] Deepesh Rawat and Vijaya Bhandari, “ A Steganography Technique for Hiding Image in an
image using LSB Method for 24 Bit color Image,” International Journal of Computer Application
(0975-8887) Volume 64-No.20, February 2013.
[9] Rawat D., Bhandari V., Steganography Technique for Hiding Text Information in Color Image
using Improved LSB Method, International Journal of Computer Applications 67(1) (2013), 22- 25.
[10] A. Saha, S. Halder and S. Kollya, “Image Steganography using 24-bit Bitmap Images”,
Proceedings of the 14th International Conference on Computer and Information Technology (ICCIT),
Bangladesh, (2011) Noveber 22-24.
[11] M. O. Islam, “A High Embedding Capacity Image Steganography using Stream Builder and
Parity Checker”, Proceedings of the 15th International Conference on Computer and Information
Technology (ICCIT), Dhaka, Bangladesh, (2012) Noveber 22-24.
[12] N. Akhtar, S. Khan and P. Johri, “An Improved Inverted LSB Image Steganography”,
Proceedings of the International Conference on Issues and Challenges in Intelligent Computing
Techniques (ICICT), (2014) February 7-8.
A Survey Paper on different Steganography Techniques S. K. Singh et al.
108

More Related Content

PDF
High Capacity and Security Steganography Using Discrete Wavelet Transform
PDF
Steganographic Substitution of the Least Significant Bit Determined Through A...
PDF
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
PDF
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
PDF
LSB Based Image Steganography for Information Security System
PDF
A novel hash based least significant bit (2 3-3) image steganography in spati...
PDF
A Comparative Study And Literature Review Of Image Steganography Techniques
PDF
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
High Capacity and Security Steganography Using Discrete Wavelet Transform
Steganographic Substitution of the Least Significant Bit Determined Through A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
LSB Based Image Steganography for Information Security System
A novel hash based least significant bit (2 3-3) image steganography in spati...
A Comparative Study And Literature Review Of Image Steganography Techniques
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION

Similar to A Survey Paper On Different Steganography Technique (20)

PDF
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
PDF
Conditional entrench spatial domain steganography
PDF
D010312230
PDF
Securing Web Communication Using Three Layer Image Shielding
PDF
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
PDF
Image Steganography V2 i11 0143
PDF
Image Steganography With Encryption
PDF
Image Steganography With Encryption
PDF
Text in Image Hiding using Developed LSB and Random Method
PDF
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
PDF
www.ijerd.com
PDF
www.ijerd.com
PDF
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
PDF
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
PDF
A Study of Various Steganographic Techniques Used for Information Hiding
PDF
Improved LSB Steganograhy Technique for grayscale and RGB images
PDF
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
PDF
Iaetsd design of image steganography using haar dwt
PDF
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
PDF
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
Conditional entrench spatial domain steganography
D010312230
Securing Web Communication Using Three Layer Image Shielding
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Image Steganography V2 i11 0143
Image Steganography With Encryption
Image Steganography With Encryption
Text in Image Hiding using Developed LSB and Random Method
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
www.ijerd.com
www.ijerd.com
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A Study of Various Steganographic Techniques Used for Information Hiding
Improved LSB Steganograhy Technique for grayscale and RGB images
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Iaetsd design of image steganography using haar dwt
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Ad

More from Jeff Brooks (20)

PDF
Freedom Writers Wiki, Synopsis, Reviews, Watch A
PDF
IELTS Academic Essay Writing Tips For A Better Score
PDF
Posted On March 31, 2017. Online assignment writing service.
PDF
Best Custom Writing Service. Best Custom Writing Service
PDF
Where To Buy Parchment Paper For Writing. Where Can I Buy Parchment
PDF
100 College Application Essay Topics. Online assignment writing service.
PDF
Moduladmission Essay Essay For University
PDF
MDA . Online assignment writing service.
PDF
Introduction About Yourself Essay Examples Sitedoct
PDF
Sociology Essay Topics. Online assignment writing service.
PDF
How To Write A Proposal Examples.Project-Proposa
PDF
How To Write A College Essay -- Bid4Papers Guide
PDF
Literature Review Sample UK. Not Sure. Online assignment writing service.
PDF
10 Tips How To Write A Debate Essay In 2023 - At
PDF
Accountants Report Sample Example Format Compilati
PDF
How To Write A Informal Letter Essay - Agnew Text
PDF
Create Chinese Character Practice Writing Sheets
PDF
Importance Of Reviews To Find Be. Online assignment writing service.
PDF
Critical Essay Topics For Exemplification Essay
PDF
Printable High School Report Writing Template Examples
Freedom Writers Wiki, Synopsis, Reviews, Watch A
IELTS Academic Essay Writing Tips For A Better Score
Posted On March 31, 2017. Online assignment writing service.
Best Custom Writing Service. Best Custom Writing Service
Where To Buy Parchment Paper For Writing. Where Can I Buy Parchment
100 College Application Essay Topics. Online assignment writing service.
Moduladmission Essay Essay For University
MDA . Online assignment writing service.
Introduction About Yourself Essay Examples Sitedoct
Sociology Essay Topics. Online assignment writing service.
How To Write A Proposal Examples.Project-Proposa
How To Write A College Essay -- Bid4Papers Guide
Literature Review Sample UK. Not Sure. Online assignment writing service.
10 Tips How To Write A Debate Essay In 2023 - At
Accountants Report Sample Example Format Compilati
How To Write A Informal Letter Essay - Agnew Text
Create Chinese Character Practice Writing Sheets
Importance Of Reviews To Find Be. Online assignment writing service.
Critical Essay Topics For Exemplification Essay
Printable High School Report Writing Template Examples
Ad

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Business Ethics Teaching Materials for college
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
01-Introduction-to-Information-Management.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Insiders guide to clinical Medicine.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
RMMM.pdf make it easy to upload and study
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Cell Types and Its function , kingdom of life
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
O7-L3 Supply Chain Operations - ICLT Program
Module 4: Burden of Disease Tutorial Slides S2 2025
human mycosis Human fungal infections are called human mycosis..pptx
Business Ethics Teaching Materials for college
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
01-Introduction-to-Information-Management.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial disease of the cardiovascular and lymphatic systems
Insiders guide to clinical Medicine.pdf
TR - Agricultural Crops Production NC III.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
RMMM.pdf make it easy to upload and study
Basic Mud Logging Guide for educational purpose
Cell Types and Its function , kingdom of life

A Survey Paper On Different Steganography Technique

  • 1. A Survey Paper on Different Steganography Techniques Shashikant Singh 1 , Seema Yadav 2 , Ankur Raj3 and Priya Gupta4 Assistant Professor JECRC,Jaipur,Rajasthan,India shashikant.cse@jecrc.ac.in1 , seemayadav.cse@jecrc.ac.in2 , ankurraj.cse@jecrc.ac.in3 , priyagupta.cse@jecrc.ac.in4 Abstract With the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. So in this digital scenario invisible communication between two parties is the prime concern. Steganography is the technique of hidden communication. It not only hides the message contents, instead it hides the existence of the message. In this paper, a new image steganography method based on spatial domain is proposed secret data hided in image segments using least significant bit (LSB) steganography is proposed. The color image is divided into four equal parts and the secret data is also divided into four equal parts and those divided data is hided in the image segments using least significant bit steganography. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications. Keywords: Steganography, least significant bit, Spatial Domain, MSE, PSNR, NC. I. Introduction 1. The advancement in digital technology with the advent of computers and internet technology has brought a revolution by transforming the world into a digital village. Some illegal eavesdroppers every time try to hack that secret data. For providing security to this secret data in digital medium there are various techniques are available[1]. Like Cryptography, Steganography, Digital watermarking etc. Basically Steganography word is derived from two Greek words “Stegos” and “Grafia” i.e. Steganographic, where Stegos means covered and Grafia means writing it means covered writing. In this technique secret message is concealed inside a cover object. There are different types Kalpa Publications in Engineering Volume 2, 2018, Pages 103–108 Proceedings on International Conference on Emerg- ing Trends in Expert Applications & Security (2018) V.K. Chandna, V.S. Rathore and S. Maheshwari (eds.), ICETEAS 2018 (Kalpa Publications in Engineering, vol. 2), pp. 103–108
  • 2. of Steganography Techniques are available based on the cover object. Cover Objects can be image, Audio, Video, Protocols etc. The secret information can be embedded in various types of covers. If information is embedded in a cover text (text file), the result is a stego-text object. Similarly, it is possible to have cover audio, video and image for embedding which result in stego-audio, stego-video and stego-image respectively. The proposed paper provide a systematic survey of existing Steganography research by categorizing existing methods according to the certain features and analysing the advantages of these features. The motive of the paper is to provide researchers with in-depth study of subject. 1.1 CLASSIFICATIONS OF DIGITAL STEGANOGRAPHY Steganography can be classified according to its importance and goals. So different types of steganography are as follows: a) Linguistic steganography: Linguistic steganography is concerned with hiding information in natural language text. One of the major transformations used in linguistic steganography is synonym substitution [2]. However, few existing studies have studied the practical application of this approach. Fig.1. Types of Steganography[2] b) Semagrams: It uses only symbols and signs to hide the information. It is further categorized into two ways: i) Visual Semagrams: A visual semagrams uses physical objects used every day to convey a message. For example: the positioning of items on a particular website. ii) Text Semagrams: This type is used to hides a message by modify the appearance of the carrier text, or by changing font size and type, or by adding extra space between words and by using different flourished in letters or handwritten text[3]. c) Image Steganography: Taking the cover object as image in steganography is known as image steganography. Generally, in this technique pixel intensities are used to hide the information. d) Network Steganography: When taking cover object as network protocol, such as TCP,UDP, A Survey Paper on different Steganography Techniques S. K. Singh et al. 104
  • 3. ICMP, IP etc, where protocol is used as carrier, is known as network protocol steganography. In the OSI network layer model there exist covert channels where steganography can be achieved in unused header bits of TCP/IP fields[4&5].. e) Video Steganography: Video Steganography is a technique to hide any kind of files or information into digital video format. Video (combination of pictures) is used as carrier for hidden information. f) Audio Steganography: When taking audio as a carrier for information hiding it is called audio steganography. It has become very significant medium due to voice over IP (VOIP) popularity. Audio steganography uses digital audio formats such as WAVE, MIDI, AVI MPEG or etc for steganography[6]. g) Text Steganography: General technique in text steganography, such as number of tabs,white spaces, capital letters, just like Morse code and etc is used to achieve information hiding. Fig.2. Block diagram of Image steganography[4] II.LSB Method: In LSB steganography, the least significant bits of the cover media’s digital data are used to conceal the message. The simplest of the LSB steganography techniques is LSB replacement. LSB replacement steganography flips the last bit of each of the data values to reflect the message that needs to be hidden[7]. Consider an 8-bitgrayscale bitmap image where each pixel is stored as a byte representing a gray scale value. Suppose the first eight pixels of the original image have the following gray scale values. 11010010 01001010 10010111 10001100 00010101 01010111 00100110 01000011 To hide the letter C whose binary value is 10000011, we would replace the LSBs of these pixels to have the following new grayscale values: 11010011 01001010 10010110 10001100 00010100 01010110 00100111 01000011 In the above example only half the LSBs need to change. [12] The difference between the cover (i.e. A Survey Paper on different Steganography Techniques S. K. Singh et al. 105
  • 4. original) image and the stego image will be hardly noticeable to the human eye. However, one of its major limitations is small size of data which can be embedded in such type of images using only LSB. LSB is extremely vulnerable to attacks. LSB techniques implemented to 24 bit formats for the color image are difficult to detect contrary to 8 bit format[8]. It is observed that there are little differences in the histograms of cover and stego image of Lena. For other images, similar characteristics are obtained. Fig.3. Cover and Stego Images of Halena: (a) Cover Image and RGB Histograms (b) Stego Image and RGB Histogram[3] From above experimental results, it is apparent that each stego-image is almost analogous to corresponding cover image and shows better imperceptibility. That is, deterioration of the quality of images due to the embedding of the secret messages cannot be distinguished. III. ADVANTAGES Steganography has unique advantages for net-espionage agents. Even if a file is known or suspected to contain Steganographic software, it is almost impossible to extract the information until the correct password is obtained. Steganography is beneficial for securely storing sensitive data, such as hiding system passwords or keys within other files[9]. In places where standard cryptography and encryption is outlawed, Steganography can be used for covert data transmission. IV. CONCLUSION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is therefore a book on magic. It is emerging in its peak because it does not attract anyone by itself [24].In this paper, analysis of Global Journal of Computer Science and Technology Volume XIII Issue IV Version I 13 ( ) Year A Survey Paper on different Steganography Techniques S. K. Singh et al. 106
  • 5. 013 2 F © 2013 Global Journals Inc. (US) A Review of Comparison Techniques of Image Steganography LSB, DCT & DWT methods has been successfully implemented and results are delivered. The MSE and PSNR of the methods are also compared and also this paper presented a background discussion and implementation on the major algorithms of steganography deployed in digital image[10]. V . FUTURE SCOPE Still efforts have to be made to increase the embedding capacity and maintain secrecy. In this method we can hide text file equal to the size of the image. Efforts can be made to hide text files having more size than image size. The secret keys have to be known to both sender and receiver. Keys are not sent in cover-images but are distributed separately. A technique can be evolved so that these keys can be generated and distributed covertly. The Transform Domain method can be utilized if more security is required[11]. If Steganography is used with Cryptography, it will prove to be an unbeatable tool in secure communication links. Security of the scheme can be improved by using advanced cryptography techniques and also improve the efficiency by using data compression techniques. References: [1]. A. A. Ali and A. H. Seddik, “Image Steganography Technique By Using Braille Method of Blind People (LSBraille)”, International Journal of Image Processing (IJIP), Vol. 7, Issue 1,PP. 81-89, 2013. [2] A. Ahmed, N. Agrawal, and S. Banerjee, “Image steganography by closest pixel-pair mapping”, IEEE- International Conference On Computing, Communications and Informatics (ICACCI), PP. 1971 - 1975, 24-27 Sept. 2014. [3] A. Nag, S. Ghosh, S. Biswas, D. Sakar, and P.P. Sakar, “An Image Steganography Technique using X-Box Mapping”, IEEE- International Conference On Advances In Engineering, Science and Management(ICAESM-2012), Vol. 3, Issue 12, PP. 709-713, March 2012. [4] A. A. Ali and A. H. Seddik, “New Image Steganography Method By Matching Secret Message With Pixels Of Cover Image (SMM)”, International Journal of Computer Science Engineering and Information Technology Research (IJCSITR), Vol. 3, Issue 2 ,PP. 1-10, Jun 2013. [5] S. Nazari, A-M. Eftekhari, and M. Sh. Moin, “Secure Information Transmission using Steganography and Morphological Associative Memory”, International Journal of Computer Applications, Vol. 61, No. 7, PP. 23-29, January 2013. [6] K.Thangadurai and G.Sudha Devi, “An analysis of LSB based image Steganography techniques,” Computer Communication and Informatics (ICCCI), International Conference on 3-5 Jan. 2014, pp.1 – 4, Publisher: IEEE. A Survey Paper on different Steganography Techniques S. K. Singh et al. 107
  • 6. [7] Amritpal Singh and Harpal Singh, “An improved LSB based image Steganography technique for RGB images,” Electrical, Computer and Communication Technologies (ICECCT), IEEE International Conference on 5-7 March 2015, pp. 1- 4. [8] Deepesh Rawat and Vijaya Bhandari, “ A Steganography Technique for Hiding Image in an image using LSB Method for 24 Bit color Image,” International Journal of Computer Application (0975-8887) Volume 64-No.20, February 2013. [9] Rawat D., Bhandari V., Steganography Technique for Hiding Text Information in Color Image using Improved LSB Method, International Journal of Computer Applications 67(1) (2013), 22- 25. [10] A. Saha, S. Halder and S. Kollya, “Image Steganography using 24-bit Bitmap Images”, Proceedings of the 14th International Conference on Computer and Information Technology (ICCIT), Bangladesh, (2011) Noveber 22-24. [11] M. O. Islam, “A High Embedding Capacity Image Steganography using Stream Builder and Parity Checker”, Proceedings of the 15th International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, (2012) Noveber 22-24. [12] N. Akhtar, S. Khan and P. Johri, “An Improved Inverted LSB Image Steganography”, Proceedings of the International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), (2014) February 7-8. A Survey Paper on different Steganography Techniques S. K. Singh et al. 108