On the capacity and security of steganography approaches: An overview

被引:25
|
作者
Hmood A.K. [1 ]
Jalab H.A. [1 ]
Kasirun Z.M. [1 ]
Zaidan B.B. [2 ]
Zaidan A.A. [2 ]
机构
[1] Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur
[2] Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor Darul Ehsan
关键词
Data hidden; Image; Steganography; Text; Video;
D O I
10.3923/jas.2010.1825.1833
中图分类号
学科分类号
摘要
The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1825 / 1833
页数:8
相关论文
共 50 条
  • [1] Capacity and security for imperfect batch steganography
    Chen, Gouxi
    Zhang, Meng
    Chen, Junjie
    Fu, Donglai
    Wu, Yuliang
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (7B): : 324 - 327
  • [2] Enhancement of Embedding Capacity and Security in Reversible Steganography
    Krishna, M. Murali
    Roberts, Nirmal
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 803 - 807
  • [3] OPTP: A new steganography scheme with high capacity and security
    Massoud Hadian Dehkordi
    Samaneh Mashhadi
    Seyed Taghi Farahi
    Mohammad Hossein Noorallahzadeh
    Shahed Vahedi
    Ahmad Gholami
    Reza Alimoradi
    Multimedia Tools and Applications, 2024, 83 : 17579 - 17599
  • [4] OPTP: A new steganography scheme with high capacity and security
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    Farahi, Seyed Taghi
    Noorallahzadeh, Mohammad Hossein
    Vahedi, Shahed
    Gholami, Ahmad
    Alimoradi, Reza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (06) : 17579 - 17599
  • [5] Steganography based information security with high embedding capacity
    Sirisha, B. Lakshmi
    Kumar, S. Srinivas
    Mohan, B. Chandra
    2015 NATIONAL CONFERENCE ON RECENT ADVANCES IN ELECTRONICS & COMPUTER ENGINEERING (RAECE), 2015, : 17 - 21
  • [6] Regulating Kashida Arabic steganography to improve security and capacity performance
    Gutub A.
    Multimedia Tools and Applications, 2025, 84 (9) : 5457 - 5490
  • [7] An Overview of Steganography
    Kessler, Gary C.
    Hosmer, Chet
    ADVANCES IN COMPUTERS, VOL 83, 2011, 83 : 51 - 107
  • [8] Capacity analysis of steganography based on the digital images under the constraints of security
    Jiang, Cuiling
    Lin, Jiajun
    Pang, Yilin
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 909 - 912
  • [9] Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity
    Chen, Tzung-Her
    Yan, Jing-Ya
    APPLIED SCIENCES-BASEL, 2023, 13 (15):
  • [10] Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions
    Al-Haidari, Fahd
    Gutub, Adnan
    Al-Kahsah, Khalid
    Hamodi, Jameel
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 396 - 399