SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 87
AN OVERVIEW OF STEGANOGRAPHY: DATA HIDING TECHNIQUE
Priya Pareek1, N. Monica2
1Student, Department of Computer Science and Engineering, GMRIT, Rajam, India
2Student, Department of Computer Science and Engineering, GMRIT, Rajam, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Steganography isamethodology whichisused to
hide the secret data in the form of embedded messages, simply
it is covered by the other messages. The word Steganography
is derived from two ancient Greek word names
"Stegano"(which means hiding or covering) and
"graph"(meaning to write). Steganography is very different
from cryptography. Cryptography is a technique whichisused
to create or generate the code which keeps information very
secure. In simple comparisons, cryptography is the one that
cannot be decrypted without the proper knowledge of
encrypted data key whereas, steganography is the one which
can be easily used to encrypt or decrypt the data.
Key Words: Steganography, Data hiding, Cryptography,
Types of Steganography.
1. INTRODUCTION
Steganography is a hiding technique which is used to hide
important information.Itacceptsorincludestheconfidential
report method in an unexpected manner. These methods
include types of information like digital signatures,
microdots, convert channels, invisibleinks,spreadspectrum
communication, etc., In the below figure, initially,Bobwants
to send the message to Alice so, Bob encryptsthemessage so
that user can get the particular message perfectly. But,
meanwhile sending the data some of the hackers(hereinthe
below diagram Oscar) is waiting to receive the messages or
data so, Bob encrypts the message and sent it to Alice. By
sending the encrypted data no one is able to receive or
retrieve the data before receivedbythereceiver. Thistypeof
methodology is known as Steganography.
2. HISTORY:
Steganography wasfirstdevelopedinAncientGreecearound
440 BC. It describes the practice of writing messages and
then inscribing that message in the underlying wood. The
message was carved on the wood of wax tablet and it was
covered with fresh wax, giving the appearanceastheunused
tablet. These tablets are transported without suspecting. An
ancient Greek describes writing messages with the practice
of melting wax of the wax tablet and then inscribing a
message in the underlying wood. The message was covered
with wax by reapplying. Later, GermansdevelopedMicrodot
technology with the help of FBI Director J. Edgar Edgar
Hoover. Microdots are photographs the size of a printed
period and typewritten pages. The message was not hidden
or encrypted. It has no attention. People have no idea and
attention towards as it is very small. Microdots transmit the
data in the form of drawings, photographs, or messages.
Another form of invisible writing is through invisible inks.
Messages are written with the help of invisible inks likefruit
juices, milk, vinegar, and urine. All of these are visible when
heated.
3. TYPES OF STEGANOGRAPHY:
3.1. Text Steganography:
It is one type of steganography which hides the message
behind the other cover text file. It involves anything from
changing the formatting of an existing text to random
characters. This message can be hidden by some of the
techniques by word shifting, line shifting. These techniques
can be divided into categories:
a) Format based techniques: The formatted text is changed
to hide the original information. The information is written
in a secret code. For example; one extra space is considered
as 0 and two extra spaces are considered as 1. Word shifting
is about adding the extra spaces betweenthe wordsinwhich
it can hide the data. Text resizing and change in a font style
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 88
like bold, italic is used to hide the text hidden format. Line
shifting is done only when it contains a huge amount of text
in a file.
b) Statistical Techniques: The word sequences or character
sequences can be used for the statistical generation of cover
text. Generally, the character sequences appear to be
random, but it hides the information. In wordsequences,the
bits of information is hidden by dictionary words.
c) Linguistics Techniques: In these methods, the syntax, and
semantics are placed in order to hide the information. In
syntactic methods, the punctuation marks like full stops or
commas are used to hide the data. In semantic methods, the
synonyms can be used to hide the secret code between
words.
3.2. Image Steganography:
If the hidden data is an image file then it is called image
steganography. The simplest method is to append the
message to the end of the image. So the image is viewed by
some image viewer application and the text at the EOF(end
of file) is generally ignored. But, if the image is viewed in the
text editor, the message can be read. The image
steganography can be classified as spatial domain
steganography and transform domain steganography.
a)Spatial domain steganography: The most common and
simplest method used in image steganography is the least
significant bit(LSB). It is used for embedding information in
a cover image. The bits present in the image can be replaced
by the hidden message. These changes cannot be identified
by the human eye. The least significant bit can be changed.
When using a 24-bit color image a bit of each of the red,
green and blue color components can be used, so a total of 3
bits can be stored in each pixel. To insert a character only
three bits are needed. Here, only half of the bits are used to
hide the message effectively.
b)Transform domain steganography: It is used for hiding a
large amount of data with high security. It hides the
information in the frequency domain byalteringmagnitudes
of Discrete CosineTransform (DCT).The2-DDCTtransforms
the image blocks from spatial domain to frequency domain.
In this JPEG image steganography technique. One of the key
characteristics of Steganography is the fact that information
is hidden in the redundant bits of an object and since
redundant bits are left out when using JPEG it was feared
that the hidden message would be damaged. The JPEG
compression algorithm has lossy and lossless stages. The
lossy stage is used to hide the messages. It is not feasible to
embed information which uses lossy compression, it would
destroy the information in the process.
3.3. Audio Steganography:
The secret message is embedded into digitized audio. There
are several methods are available in audio steganography.
a) Echo Hiding: This method embeds data or text into audio
signals by adding a small echo to the host signal. The Nature
of the echo is a resonance added to the host audio. If only
one echo is produced from the original signal, then only one
bit of information could be encoded.
b) Phase Coding: In this phase components of sound are not
as perceptible to the human ear. It can be done by
substituting the phase of an initial audio segment with a
reference phase that represents the data. It encodes the
message bits as phase shifts in the phase spectrum of a
digital signal.
c) Parity Coding: This method breaks a signal down into
different regions of samples and encodes each bit from the
secret message in a sample region's parity bit. If the parity
bit of the selected region does not match the secret bit to be
encoded.
d) Spread Spectrum: It spreads the message bits over the
entire sound file. It is used to encode a category of
information by spreading the encoded data across the
frequency spectrum.
e)Tone insertion: In this inaudibility of lowerpowertones in
the presence of significantly higher ones. Tone insertion
method can resist attacks such as low-pass filtering and bit
truncation addition to low embedding capacity
3.4. Video Steganography:
The main aim of video steganography is to hide the data
from others and main secrecy of which is going to be
transmitted. The messages do not know the third person.
The message is unknown to others except for sender and
receiver. It is of hiding the information within other video
information such that there is no change in the cover
information. Generally, humans have some weaknesses in
the Human Vision System(VHS). Due to these weaknesses, a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 89
human cannot observe very minor changes in the vision. So,
the data can be hidden from other people with the help of
videos. A video contains various frames which can beplayed
back the video at fixed frame rates. The video size can also
be compressed by some techniques.
4. CONCLUSION:
Steganography is a technique which is used to hide the
information but there is no guarantee of hidingthecomplete
information without proper security. The data can bestored
in different formats like image, video, audio, etc., as
discussed earlier in this paper. In recent years, hiding the
data with confidentiality is more important so many of the
people are showing interest towards the Steganography.
5. REFERENCES:
1. Arvind Kumar and Km. Pooja. Article:
Steganography- A Data Hiding Technique.
International Journal of Computer Applications
9(7):19–23, November 2010. Published By
Foundation of Computer Science.
2. Harjit Singh, “Analysis of Different Types of
Steganography”. International Journal of Scientific
Research in Science, Engineering, and
Technology.IJSRSET | Volume 2 | Issue 3. 2016
3. http://ijsrset.com/IJSRSET1623161
4. Maninder Singh Rana, Bhupender Singh Sangwan,
Jitendra Singh Jangir, “Art of Hiding: An
Introduction to Steganography”, International
Journal Of Engineering And Computer Science
Volume-1 Issue 1 Oct 2012 Page No. 11-22
5. http://www.webtorials.com/main/eduweb/securit
y/tutorial/steg/steg.pdf
6. Masoud Nosrati, Ronak Karimi, Mehdi Hariri “An
introduction to steganography methods”, World
Applied Programming, Vol (1), No (3),August2011.
191-195 ISSN: 2222-2510 ©2011
7. https://www.cerias.purdue.edu/assets/pdf/bibtex_
archive/2004-13.pdf
8. Saritha Namboodiri,Shilpa Rajan”Steganographyin
Putative Protein Coding RegionsofEukaryoticDNA:
A Novel Approach”, International Journal of
Advanced Research in Computer Science and
Software Engineering 3(9), September - 2013, pp.
523-533
9. http://shodhganga.inflibnet.ac.in/bitstream/10603
/141644/9/09_chapter%201.pdf
10. https://www.researchgate.net/profile/Merrill_War
kentin/publication/315910035_Steganography_For
ensic_Security_and_Legal_Issues/links/5909d633a6
fdcc49616f038c/Steganography-Forensic-Security-
and-Legal-Issues.pdf
11. Jayati Bhadra, A.M. Bojamma, Prasad .C.N., M.N.
Nachappa “An Insight to Steganography” -
International Journal of Innovative Science,
Engineering & Technology, Vol. 1 Issue 10,
December 2014. found online at
(http://www.ijiset.com/v1s10/IJISET_V1_I10_06.p
df)
12. Chin-Chen Chang, Yuan-Chang Lin, and Yuan-Hui
YU, “A new Steganographic method for color and
grayscale image hiding”, Computer Vision and
Image Understanding, 20 December 2006.
13. Mr. Falesh M. Shelke, Miss. Ashwini A. Dongre, Mr.
Pravin D. Soni3 “Comparison ofdifferenttechniques
for Steganographyinimages”-International Journal
of Application or Innovation in Engineering &
Management (IJAIEM). Volume 3, Issue 2, February
2014 (
https://www.ijaiem.org/volume3issue2/IJAIEM-
2014-02-27-062.pdf )
14. Navneet Kaur, Sunny Behal “A Survey on
various types of Steganography and Analysis
of Hiding Techniques” - International Journal of
Engineering Trends and Technology (IJETT) –
Volume 11 Number 8 - May 2014
(http://www.ijettjournal.org/volume-11/number-
8/IJETT-V11P276.pdf)
15. Kamred Udham Singh Int. “Video-Steganography:
Text Hiding In Video By LSB Substitution”Journal of
Engineering Research and Applications
www.ijera.com ISSN: 2248-9622, Vol.4, Issue 5
(Version1), May 2014, pp.105-108
http://www.ijera.com/papers/Vol4_issue5/Version
%201/S4501105108.pdf

More Related Content

PDF
IRJET- Concealing of Deets using Steganography Technique
PDF
IRJET- Image Processing using Steganography
PDF
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
PDF
S4501105108
DOCX
Images Steganography using Pixel Value Difference and Histogram Analysis
PDF
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
PDF
P0460594100
PDF
Hiding text in audio using lsb based steganography
IRJET- Concealing of Deets using Steganography Technique
IRJET- Image Processing using Steganography
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
S4501105108
Images Steganography using Pixel Value Difference and Histogram Analysis
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
P0460594100
Hiding text in audio using lsb based steganography

What's hot (20)

PDF
ANURADHA_FINAL_REPORT
PPTX
Audio steganography algorithms
PPTX
Data Hiding in Audio Signals
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
PPTX
VIDEO STEGANOGRAPHY
PDF
Data Security Using Audio Steganography
PPTX
Steganography and watermarking
DOCX
Audio Steganography synopsis
PDF
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
PDF
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
PPTX
Cryptography and steganography
PDF
Digital Steganography in Computer Forensics
PPTX
Steganography
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
PDF
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
PPTX
Audio steganography
PDF
A Study of Various Steganographic Techniques Used for Information Hiding
DOCX
Technical seminar report
PDF
Enhancement of Data Hiding Capacity in Audio Steganography
ANURADHA_FINAL_REPORT
Audio steganography algorithms
Data Hiding in Audio Signals
Welcome to International Journal of Engineering Research and Development (IJERD)
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
VIDEO STEGANOGRAPHY
Data Security Using Audio Steganography
Steganography and watermarking
Audio Steganography synopsis
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
Cryptography and steganography
Digital Steganography in Computer Forensics
Steganography
AUDIO STEGANOGRAPHY PRESENTATION
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Audio steganography
A Study of Various Steganographic Techniques Used for Information Hiding
Technical seminar report
Enhancement of Data Hiding Capacity in Audio Steganography
Ad

Similar to IRJET- An Overview of Steganography : Data Hiding Technique (20)

PDF
Survey Paper on Steganography
PDF
A Tutorial Review On Steganography
PDF
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
PDF
Analysis Of Different Types Of Steganography
PPTX
Steganograpy
PDF
A Review paper on Steganography Techniques
PDF
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
PDF
Understanding Image Steganography with Practical Approach
PPT
Steganography presentation
PPTX
review.pptx
DOCX
Steganography
DOC
Steganography ProjectReport
PDF
A Review Paper On Steganography Techniques
PPTX
HACKING
PPTX
Steganography(Presentation)
PPTX
Steganography presentation
PPTX
PPT steganography
PDF
MESSAGE TRANSFER USING STEGANOGRAPHY
PDF
A Survey of Image Steganography
Survey Paper on Steganography
A Tutorial Review On Steganography
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
Analysis Of Different Types Of Steganography
Steganograpy
A Review paper on Steganography Techniques
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
Understanding Image Steganography with Practical Approach
Steganography presentation
review.pptx
Steganography
Steganography ProjectReport
A Review Paper On Steganography Techniques
HACKING
Steganography(Presentation)
Steganography presentation
PPT steganography
MESSAGE TRANSFER USING STEGANOGRAPHY
A Survey of Image Steganography
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Sustainable Sites - Green Building Construction
PPTX
web development for engineering and engineering
PPT
Mechanical Engineering MATERIALS Selection
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Current and future trends in Computer Vision.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Digital Logic Computer Design lecture notes
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
CH1 Production IntroductoryConcepts.pptx
Construction Project Organization Group 2.pptx
Foundation to blockchain - A guide to Blockchain Tech
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Sustainable Sites - Green Building Construction
web development for engineering and engineering
Mechanical Engineering MATERIALS Selection
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Internet of Things (IOT) - A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
R24 SURVEYING LAB MANUAL for civil enggi
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Current and future trends in Computer Vision.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Digital Logic Computer Design lecture notes
additive manufacturing of ss316l using mig welding
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT 4 Total Quality Management .pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf

IRJET- An Overview of Steganography : Data Hiding Technique

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 87 AN OVERVIEW OF STEGANOGRAPHY: DATA HIDING TECHNIQUE Priya Pareek1, N. Monica2 1Student, Department of Computer Science and Engineering, GMRIT, Rajam, India 2Student, Department of Computer Science and Engineering, GMRIT, Rajam, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Steganography isamethodology whichisused to hide the secret data in the form of embedded messages, simply it is covered by the other messages. The word Steganography is derived from two ancient Greek word names "Stegano"(which means hiding or covering) and "graph"(meaning to write). Steganography is very different from cryptography. Cryptography is a technique whichisused to create or generate the code which keeps information very secure. In simple comparisons, cryptography is the one that cannot be decrypted without the proper knowledge of encrypted data key whereas, steganography is the one which can be easily used to encrypt or decrypt the data. Key Words: Steganography, Data hiding, Cryptography, Types of Steganography. 1. INTRODUCTION Steganography is a hiding technique which is used to hide important information.Itacceptsorincludestheconfidential report method in an unexpected manner. These methods include types of information like digital signatures, microdots, convert channels, invisibleinks,spreadspectrum communication, etc., In the below figure, initially,Bobwants to send the message to Alice so, Bob encryptsthemessage so that user can get the particular message perfectly. But, meanwhile sending the data some of the hackers(hereinthe below diagram Oscar) is waiting to receive the messages or data so, Bob encrypts the message and sent it to Alice. By sending the encrypted data no one is able to receive or retrieve the data before receivedbythereceiver. Thistypeof methodology is known as Steganography. 2. HISTORY: Steganography wasfirstdevelopedinAncientGreecearound 440 BC. It describes the practice of writing messages and then inscribing that message in the underlying wood. The message was carved on the wood of wax tablet and it was covered with fresh wax, giving the appearanceastheunused tablet. These tablets are transported without suspecting. An ancient Greek describes writing messages with the practice of melting wax of the wax tablet and then inscribing a message in the underlying wood. The message was covered with wax by reapplying. Later, GermansdevelopedMicrodot technology with the help of FBI Director J. Edgar Edgar Hoover. Microdots are photographs the size of a printed period and typewritten pages. The message was not hidden or encrypted. It has no attention. People have no idea and attention towards as it is very small. Microdots transmit the data in the form of drawings, photographs, or messages. Another form of invisible writing is through invisible inks. Messages are written with the help of invisible inks likefruit juices, milk, vinegar, and urine. All of these are visible when heated. 3. TYPES OF STEGANOGRAPHY: 3.1. Text Steganography: It is one type of steganography which hides the message behind the other cover text file. It involves anything from changing the formatting of an existing text to random characters. This message can be hidden by some of the techniques by word shifting, line shifting. These techniques can be divided into categories: a) Format based techniques: The formatted text is changed to hide the original information. The information is written in a secret code. For example; one extra space is considered as 0 and two extra spaces are considered as 1. Word shifting is about adding the extra spaces betweenthe wordsinwhich it can hide the data. Text resizing and change in a font style
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 88 like bold, italic is used to hide the text hidden format. Line shifting is done only when it contains a huge amount of text in a file. b) Statistical Techniques: The word sequences or character sequences can be used for the statistical generation of cover text. Generally, the character sequences appear to be random, but it hides the information. In wordsequences,the bits of information is hidden by dictionary words. c) Linguistics Techniques: In these methods, the syntax, and semantics are placed in order to hide the information. In syntactic methods, the punctuation marks like full stops or commas are used to hide the data. In semantic methods, the synonyms can be used to hide the secret code between words. 3.2. Image Steganography: If the hidden data is an image file then it is called image steganography. The simplest method is to append the message to the end of the image. So the image is viewed by some image viewer application and the text at the EOF(end of file) is generally ignored. But, if the image is viewed in the text editor, the message can be read. The image steganography can be classified as spatial domain steganography and transform domain steganography. a)Spatial domain steganography: The most common and simplest method used in image steganography is the least significant bit(LSB). It is used for embedding information in a cover image. The bits present in the image can be replaced by the hidden message. These changes cannot be identified by the human eye. The least significant bit can be changed. When using a 24-bit color image a bit of each of the red, green and blue color components can be used, so a total of 3 bits can be stored in each pixel. To insert a character only three bits are needed. Here, only half of the bits are used to hide the message effectively. b)Transform domain steganography: It is used for hiding a large amount of data with high security. It hides the information in the frequency domain byalteringmagnitudes of Discrete CosineTransform (DCT).The2-DDCTtransforms the image blocks from spatial domain to frequency domain. In this JPEG image steganography technique. One of the key characteristics of Steganography is the fact that information is hidden in the redundant bits of an object and since redundant bits are left out when using JPEG it was feared that the hidden message would be damaged. The JPEG compression algorithm has lossy and lossless stages. The lossy stage is used to hide the messages. It is not feasible to embed information which uses lossy compression, it would destroy the information in the process. 3.3. Audio Steganography: The secret message is embedded into digitized audio. There are several methods are available in audio steganography. a) Echo Hiding: This method embeds data or text into audio signals by adding a small echo to the host signal. The Nature of the echo is a resonance added to the host audio. If only one echo is produced from the original signal, then only one bit of information could be encoded. b) Phase Coding: In this phase components of sound are not as perceptible to the human ear. It can be done by substituting the phase of an initial audio segment with a reference phase that represents the data. It encodes the message bits as phase shifts in the phase spectrum of a digital signal. c) Parity Coding: This method breaks a signal down into different regions of samples and encodes each bit from the secret message in a sample region's parity bit. If the parity bit of the selected region does not match the secret bit to be encoded. d) Spread Spectrum: It spreads the message bits over the entire sound file. It is used to encode a category of information by spreading the encoded data across the frequency spectrum. e)Tone insertion: In this inaudibility of lowerpowertones in the presence of significantly higher ones. Tone insertion method can resist attacks such as low-pass filtering and bit truncation addition to low embedding capacity 3.4. Video Steganography: The main aim of video steganography is to hide the data from others and main secrecy of which is going to be transmitted. The messages do not know the third person. The message is unknown to others except for sender and receiver. It is of hiding the information within other video information such that there is no change in the cover information. Generally, humans have some weaknesses in the Human Vision System(VHS). Due to these weaknesses, a
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 89 human cannot observe very minor changes in the vision. So, the data can be hidden from other people with the help of videos. A video contains various frames which can beplayed back the video at fixed frame rates. The video size can also be compressed by some techniques. 4. CONCLUSION: Steganography is a technique which is used to hide the information but there is no guarantee of hidingthecomplete information without proper security. The data can bestored in different formats like image, video, audio, etc., as discussed earlier in this paper. In recent years, hiding the data with confidentiality is more important so many of the people are showing interest towards the Steganography. 5. REFERENCES: 1. Arvind Kumar and Km. Pooja. Article: Steganography- A Data Hiding Technique. International Journal of Computer Applications 9(7):19–23, November 2010. Published By Foundation of Computer Science. 2. Harjit Singh, “Analysis of Different Types of Steganography”. International Journal of Scientific Research in Science, Engineering, and Technology.IJSRSET | Volume 2 | Issue 3. 2016 3. http://ijsrset.com/IJSRSET1623161 4. Maninder Singh Rana, Bhupender Singh Sangwan, Jitendra Singh Jangir, “Art of Hiding: An Introduction to Steganography”, International Journal Of Engineering And Computer Science Volume-1 Issue 1 Oct 2012 Page No. 11-22 5. http://www.webtorials.com/main/eduweb/securit y/tutorial/steg/steg.pdf 6. Masoud Nosrati, Ronak Karimi, Mehdi Hariri “An introduction to steganography methods”, World Applied Programming, Vol (1), No (3),August2011. 191-195 ISSN: 2222-2510 ©2011 7. https://www.cerias.purdue.edu/assets/pdf/bibtex_ archive/2004-13.pdf 8. Saritha Namboodiri,Shilpa Rajan”Steganographyin Putative Protein Coding RegionsofEukaryoticDNA: A Novel Approach”, International Journal of Advanced Research in Computer Science and Software Engineering 3(9), September - 2013, pp. 523-533 9. http://shodhganga.inflibnet.ac.in/bitstream/10603 /141644/9/09_chapter%201.pdf 10. https://www.researchgate.net/profile/Merrill_War kentin/publication/315910035_Steganography_For ensic_Security_and_Legal_Issues/links/5909d633a6 fdcc49616f038c/Steganography-Forensic-Security- and-Legal-Issues.pdf 11. Jayati Bhadra, A.M. Bojamma, Prasad .C.N., M.N. Nachappa “An Insight to Steganography” - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 10, December 2014. found online at (http://www.ijiset.com/v1s10/IJISET_V1_I10_06.p df) 12. Chin-Chen Chang, Yuan-Chang Lin, and Yuan-Hui YU, “A new Steganographic method for color and grayscale image hiding”, Computer Vision and Image Understanding, 20 December 2006. 13. Mr. Falesh M. Shelke, Miss. Ashwini A. Dongre, Mr. Pravin D. Soni3 “Comparison ofdifferenttechniques for Steganographyinimages”-International Journal of Application or Innovation in Engineering & Management (IJAIEM). Volume 3, Issue 2, February 2014 ( https://www.ijaiem.org/volume3issue2/IJAIEM- 2014-02-27-062.pdf ) 14. Navneet Kaur, Sunny Behal “A Survey on various types of Steganography and Analysis of Hiding Techniques” - International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014 (http://www.ijettjournal.org/volume-11/number- 8/IJETT-V11P276.pdf) 15. Kamred Udham Singh Int. “Video-Steganography: Text Hiding In Video By LSB Substitution”Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol.4, Issue 5 (Version1), May 2014, pp.105-108 http://www.ijera.com/papers/Vol4_issue5/Version %201/S4501105108.pdf