On the capacity and security of steganography approaches: An overview

被引:25
|
作者
Hmood A.K. [1 ]
Jalab H.A. [1 ]
Kasirun Z.M. [1 ]
Zaidan B.B. [2 ]
Zaidan A.A. [2 ]
机构
[1] Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur
[2] Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor Darul Ehsan
关键词
Data hidden; Image; Steganography; Text; Video;
D O I
10.3923/jas.2010.1825.1833
中图分类号
学科分类号
摘要
The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1825 / 1833
页数:8
相关论文
共 50 条
  • [31] Steganography capacity: A steganalysis perspective
    Chandramouli, R
    Memon, ND
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 173 - 177
  • [32] Capacity Laws for Steganography in a Crowd
    Ker, Andrew D.
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 147 - 156
  • [33] A study of the security of a steganography method and security enhancement methods
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2006, 3 (448-452):
  • [34] Security and Privacy for the Industrial Internet of Things An overview of approaches to safeguarding endpoints
    Zhou, Lu
    Yeh, Kuo-Hui
    Hancke, Gerhard
    Liu, Zhe
    Su, Chunhua
    IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (05) : 76 - 87
  • [35] Theoretical linkages and policy approaches to the environment and security debate: Providing an overview
    Petzold-Bradley, E
    Carius, A
    March, A
    Vincze, A
    RESPONDING TO ENVIRONMENTAL CONFLICTS: IMPLICATIONS FOR THEORY AND PRACTICE, 2001, 78 : 1 - 19
  • [36] Landscape of policies, standards, approaches, and projects for EU food security: an overview
    Charis M. Galanakis
    Markos I. Daskalakis
    Ioannis M. Galanakis
    Maryna Nehrey
    Maria Spanou
    Anna Vetsou
    Anastasia Chalkidou
    Evita Agrafioti
    Discover Food, 5 (1):
  • [37] Efficient steganography with provable security guarantees
    Kiayias, A
    Raekow, Y
    Russell, A
    INFORMATION HIDING, 2005, 3727 : 118 - 130
  • [38] An Optimization Strategy for Improving Security in Steganography
    Wu, Xiancheng
    Tan, Shunquan
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1461 - 1466
  • [39] Special section on security, steganography, and watermarking
    Dittmann, Jana
    Delp, Edward J.
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [40] Enhancing the Security of a Gateway Through Steganography
    Nwanebu, Docas
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 287 - 293