On the capacity and security of steganography approaches: An overview

被引:25
|
作者
Hmood A.K. [1 ]
Jalab H.A. [1 ]
Kasirun Z.M. [1 ]
Zaidan B.B. [2 ]
Zaidan A.A. [2 ]
机构
[1] Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur
[2] Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor Darul Ehsan
关键词
Data hidden; Image; Steganography; Text; Video;
D O I
10.3923/jas.2010.1825.1833
中图分类号
学科分类号
摘要
The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1825 / 1833
页数:8
相关论文
共 50 条
  • [41] On the Gold Standard for Security of Universal Steganography
    Berndt, Sebastian
    Liskiewicz, Maciej
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 29 - 60
  • [42] CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY
    Kocak, Cemal
    IMAGE ANALYSIS & STEREOLOGY, 2017, 36 (01): : 15 - 23
  • [43] Reversible adversarial steganography for security enhancement
    Luo, Jie
    He, Peisong
    Liu, Jiayong
    Wang, Hongxia
    Wu, Chunwang
    Zhou, Shenglie
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2023, 97
  • [44] Multiple Security Enhancements for Image Steganography
    Mohan, Megha
    Sandeep, Anitha
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 298 - 302
  • [45] Implementation of cryptography in steganography for enhanced security
    Antonio, Harianto
    Prasad, P. W. C.
    Alsadoon, Abeer
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) : 32721 - 32734
  • [46] Neural Linguistic Steganography with Controllable Security
    Lu, Tianhe
    Liu, Gongshen
    Zhang, Ru
    Ju, Tianjie
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [47] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [48] Implementation of cryptography in steganography for enhanced security
    Harianto Antonio
    P. W. C. Prasad
    Abeer Alsadoon
    Multimedia Tools and Applications, 2019, 78 : 32721 - 32734
  • [49] High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method
    Hameed R.S.
    Mokri S.S.
    Taha M.S.
    Taher M.M.
    International Journal of Advanced Computer Science and Applications, 2022, 13 (08) : 108 - 115
  • [50] Steganography: Forensic, Security, and Legal Issues
    Warkentin, Merrill
    Bekkering, Ernst
    Schmidt, Mark B.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2008, 3 (02) : 17 - 34