On the capacity and security of steganography approaches: An overview

被引:25
|
作者
Hmood A.K. [1 ]
Jalab H.A. [1 ]
Kasirun Z.M. [1 ]
Zaidan B.B. [2 ]
Zaidan A.A. [2 ]
机构
[1] Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur
[2] Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor Darul Ehsan
关键词
Data hidden; Image; Steganography; Text; Video;
D O I
10.3923/jas.2010.1825.1833
中图分类号
学科分类号
摘要
The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1825 / 1833
页数:8
相关论文
共 50 条
  • [21] Language Planning and Questions of National Security: An Overview of Planning Approaches
    Liddicoat, Anthony J.
    CURRENT ISSUES IN LANGUAGE PLANNING, 2008, 9 (02) : 129 - 153
  • [22] Overview of Security Approaches in 4G LTE Network
    Yusoff, Rohaiza
    Rohmad, Mohd Saufy
    Baba, Mohd Dani
    INTERNATIONAL CONFERENCE ON ADVANCED SCIENCE, ENGINEERING AND TECHNOLOGY (ICASET 2015), 2016, 1774
  • [23] Significance of steganography on data security
    Venkatraman, S
    Abraham, A
    Paprzycki, M
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 347 - 351
  • [24] High Security and Capacity of Image Steganography for Hiding Human Speech Based on Spatial and Cepstral Domains
    Khaleel, Yazen A.
    ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (01): : 95 - 106
  • [25] Steganography approaches, options, and implications
    Frith, David
    Network Security, 2007, 2007 (08) : 4 - 7
  • [26] Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
    Alanazi, Norah
    Khan, Esam
    Gutub, Adnan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) : 1403 - 1431
  • [27] Steganography Algorithm Multi Pixel Value Differencing (MPVD) to Increase Message Capacity and Data Security
    Rojali
    Siahaan, Ida Sri Rejeki
    Soewito, Benfano
    INTERNATIONAL CONFERENCE ON MATHEMATICS: PURE, APPLIED AND COMPUTATION: EMPOWERING ENGINEERING USING MATHEMATICS, 2017, 1867
  • [28] Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
    Norah Alanazi
    Esam Khan
    Adnan Gutub
    Multimedia Tools and Applications, 2021, 80 : 1403 - 1431
  • [29] High-Capacity Steganography
    Rabie, Tamer
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 858 - 863
  • [30] A capacity result for batch steganography
    Ker, Andrew D.
    IEEE SIGNAL PROCESSING LETTERS, 2007, 14 (08) : 525 - 528