scholarly journals Secure Data Transfer over Internet Using Image Steganography: Review

Author(s):  
Dakhaz Mustafa Abdullah ◽  
Siddeeq Y. Ameen ◽  
Naaman Omar ◽  
Azar Abid Salih ◽  
Dindar Mikaeel Ahmed ◽  
...  

Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed.

Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


CCIT Journal ◽  
2016 ◽  
Vol 9 (2) ◽  
pp. 214-224
Author(s):  
Sugeng Santoso ◽  
Arisman Arisman ◽  
Windy Sentanu

Security of distributed information is essential for maintaining the confidentiality of the information. The process of securing is done by hiding the information on other digital media that are not visible existence. This technique is called steganography, the art of hiding data into digital media with a particular method so that other people do not realize there is something in the digital media. In this paper conducted a study to hide information into digital audio file is not compressed (. Wav) as a carrier file using the Least Significant Bit Modification. Least Significant Bit Modification is a method of hiding information by modifying the last bits of carrier files with the bits of information and only cause changes in the value of a bit higher or a lower one. The system was designed with two main processes, namely phase Embedding and Extracting stage


In today’s era use of digital media is most popular way of communication. Digital media covers images, videos and animations available online. The easy methods of accessing, copying and editing digital media have made them more popular. With several advantages these easy methods of copying and editing data have created some big issues like ownership identification. This increases the demand of protecting online digital media. Watermarking is solution of such problem. In this work, a block-based method has been proposed for video watermarking that uses a key at the time of embedding and extraction. Some frames are selected from the video according to a key. Watermark is embedded on the selected frames after dividing into parts called blocks. Each part of the watermark is embedded in one selected frame of the video. This method increases the security of the system as the complete watermark cannot be extracted without knowing the positions of watermarked frames and the position of the block in that frame. Watermarking is performed in the Discrete Wavelet Transform domain after scaling of watermark data. To show the authenticity of proposed scheme various attacks are applied on different watermarked video frames and extracted watermark results are shown under different tables.


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


2010 ◽  
Vol 121-122 ◽  
pp. 1044-1047
Author(s):  
Sheng Bing Che ◽  
Xu Shu

Based on human eye visual characteristics of brightness and texture, a new region segmentation method and quantitative formulas in transform domain were put forward. By dynamic quantization, the transparency of carrier images and the anti-attack capability of watermarking images were improved. And a new kind of adjustment operator was brought up, which adjusted the pixel value after inverse discrete wavelet transform.


2019 ◽  
Vol 17 (71) ◽  
pp. 1-12
Author(s):  
Naseef Husam Mohammad ◽  
Ahmed Abdul-latief Mohammed

This paper, will overview the use of data hiding techniques in JPEG digital image file format. In particular, will describe how one can use Steganography to hide information in a JPEG digital image. This research will review of hiding data by using Least Significant Bit (LSB) as a method, and hiding a text (document) in a JPEG image as a media cover. This paper was implemented by using matlab to complete hiding data. Data hiding is a technique that is used to embed secret information into a cover media. However, the transmitted images may be compressed or not. When it is transmitted, an errors transmitting may occur. If such errors occurred, the receiver cannot extract the information correctly from the cover_image. Digital media have been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at anytime.


In the past of years of development of digital communication and network communication technology with increase in transferring documents all over the world, the authenticity and ownership of document is also important and challenging to control. To solve these problems so many techniques evolved which comes under transform domain and spatial domain based watermarking techniques. Most commonly used popular digital image watermarking techniques based on Transform Domain are like Discrete Cosine Transformation (DCT), Discrete Fourier Transformation (DFT), Discrete Wavelet Transformation (DWT) and Singular Value Decomposition (SVD) transformations. But with lot of introduced techniques there must be a standard parameterized study required which compares them individually and explain their actual performance. In this paper, we implement watermarking using Transform Domain based techniques DCT, DWT and SVD and compare them practically on standard parameters like imperceptibility & robustness with use of standard attacks. For the analysis of them we take standard images for implementation of digital image watermarking. All work done in Matlab platform. Experimental result shows the performance quality of DCT, DWT and SVD based watermarking techniques with standard quality parameters.


2020 ◽  
Vol 177 (1) ◽  
pp. 132-138 ◽  
Author(s):  
Jan Michael Alexandre C Bernadas ◽  
Karol Ilagan

In this essay, we engage with the call for Extraordinary Issue: Coronavirus, Crisis and Communication. Situated in the Philippines, we reflect on how COVID-19 has made visible the often-overlooked relationship between journalism and public health. In covering the pandemic, journalists struggle with the shrinking space for press freedom and limited access to information as they also grapple with threats to their physical and mental well-being. Digital media enable journalists to report even in quarantine, but new challenges such as the wide circulation of health mis-/disinformation and private information emerge. Moreover, journalists have to contend with broader structural contexts of shutdown not just of a mainstream broadcast but also of community newspapers serving as critical sources of pandemic-related information. Overall, we hope this essay broadens the dialogue among journalists, policymakers, and healthcare professionals to improve the delivery of public health services and advance health reporting.


2021 ◽  
pp. 205015792098482
Author(s):  
Linus Andersson ◽  
Ebba Sundin

This article addresses the phenomenon of mobile bystanders who use their smartphones to film or take photographs at accident scenes, instead of offering their help to people in need or to assist medical units. This phenomenon has been extensively discussed in Swedish news media in recent years since it has been described as a growing problem for first responders, such as paramedics, police, and firefighters. This article aims to identify theoretical perspectives that are relevant for analyzing mobile media practices and discuss the ethical implications of these perspectives. Our purpose is twofold: we want to develop a theoretical framework for critically approaching mobile media practices, and we want to contribute to discussions concerning well-being in a time marked by mediatization and digitalization. In this pursuit, we combine theory from social psychology about how people behave at traumatic scenes with discussions about witnessing in and through media, as developed in media and communication studies. Both perspectives offer various implications for normative inquiry, and in our discussion, we argue that mobile bystanders must be considered simultaneously as transgressors of social norms and as emphatic witnesses behaving in accordance with the digital media age. The article ends with a discussion regarding the implications for further research.


Sign in / Sign up

Export Citation Format

Share Document