scholarly journals comparatives study of steganography and steganalysis tools

2021 ◽  
Vol 1 (2) ◽  
pp. 92-98
Author(s):  
BENAROUS Leila ◽  
DJOUDI Mohamed ◽  
BOURIDANE Ahmed

Steganography is one of the oldest methods of secure communication. It was an art at the beginning, now became a science. It aims to conceal secret messages or data inside an innocent cover. Steganalysis is the science that can detect and extract hidden data. Many steganography and steganalysis tools exist, a lot of them are free which makes it easy for anyone to use these tools. In this paper, a comparative study will be done between two widely used steganography tools (StegHide and OurSecret) and between three steganalysis tools StegSpy, StegSecret and Hidden data detector.

2019 ◽  
Vol 17 (1) ◽  
pp. 128-136
Author(s):  
Mohammad Alia ◽  
Khaled Suwais

Steganography is the art of hiding secret data inside digital multimedia such as image, audio, text and video. It plays a significant role in current trends for providing secure communication and guarantees accessibility of secret information by authorised parties only. The Least-Significant Bit (LSB) approach is one of the important schemes in steganography. The majority of LSB-based schemes suffer from several problems due to distortion in a limited payload capacity for stego-image. In this paper, we have presented an alternative steganographic scheme that does not rely on cover images as in existing schemes. Instead, the image which includes the secure hidden data is generated as an image of a curve. This curve is resulted from a series of computation that is carried out over the mathematical chaotic fractal sets. The new scheme aims at improving the data concealing capacity, since it achieves limitless concealing capacity and disposes of the likelihood of the attackers to realise any secret information from the resulted stego-image. From the security side, the proposed scheme enhances the level of security as the scheme depends on the exact matching between secret information and the generated fractal (Mandelbrot-Julia) values. Accordingly, a key stream is created based on these matches. The proposed scheme is evaluated and tested successfully from different perspectives


2022 ◽  
Vol 11 (2) ◽  
pp. 0-0

Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently proposed RDH methods lack robustness. Robust RDH methods are required to protect the hidden data from security attacks at the time of communication between the sender and receiver. In this paper, we propose a Robust RDH scheme using IPVO based pairwise embedding. The proposed scheme is designed to prevent unintentional modifications caused to the secret data by JPEG compression. The cover image is decomposed into two planes namely HSB plane and LSB plane. As JPEG compression most likely modifies the LSBs of the cover image during compression, it is best not to hide the secret data into LSB planes. So, the proposed method utilizes a pairwise embedding to embed secret data into HSB plane of the cover image. High fidelity improved pixel value ordering (IPVO) based pairwise embedding ensures that the embedding performance of the proposed method is improved.


2020 ◽  
Author(s):  
Bruno Oliveira Ferreira de Souza ◽  
Éve‐Marie Frigon ◽  
Robert Tremblay‐Laliberté ◽  
Christian Casanova ◽  
Denis Boire

2001 ◽  
Vol 268 (6) ◽  
pp. 1739-1748
Author(s):  
Aitor Hierro ◽  
Jesus M. Arizmendi ◽  
Javier De Las Rivas ◽  
M. Angeles Urbaneja ◽  
Adelina Prado ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document