scholarly journals Review of Steganography Algorithms

Author(s):  
Ali Mohammed Ahmed ◽  
Ibrahim Mahmood Rashid

The ability to hide plays a vital role in effective secret communication. This is achieved by hiding information (Steganography). The science of concealing information is the science of concealing information in other information so that it appears that hidden information is not something to the human eye. There are many ways to hide information within an image, audio / video, document, etc. But hiding information in pictures has its own characteristics and is the most popular among others. This paper provides a review of several methods, such as image field and conversion field algorithms available to implement image information hiding (Steganography). In this paper, high-capacity information hidings schemes are analyzed for different file formats. Secret communication is done before Password encryption to protect information. The intended recipient will decrypt the information using this password.

2021 ◽  
Vol 1802 (3) ◽  
pp. 032027
Author(s):  
Zhenjie Bao ◽  
Yadong Jin ◽  
Yue Liu ◽  
Jingyun Hu

2021 ◽  
Vol 10 (1) ◽  
pp. 493-500
Author(s):  
Roshidi Din ◽  
Reema Ahmed Thabit ◽  
Nur Izura Udzir ◽  
Sunariya Utama

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.


The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


Sign in / Sign up

Export Citation Format

Share Document