On the capacity and security of steganography approaches: An overview

被引:25
作者
Hmood A.K. [1 ]
Jalab H.A. [1 ]
Kasirun Z.M. [1 ]
Zaidan B.B. [2 ]
Zaidan A.A. [2 ]
机构
[1] Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur
[2] Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor Darul Ehsan
关键词
Data hidden; Image; Steganography; Text; Video;
D O I
10.3923/jas.2010.1825.1833
中图分类号
学科分类号
摘要
The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1825 / 1833
页数:8
相关论文
共 51 条
  • [1] Aabed M.A., Awaideh S.M., Elshafei A.M., Gutub A.A., Arabic diacritics based steganography, Proceedings of the International Conference on Signal Processing and Communications, pp. 756-759, (2007)
  • [2] Ahmed M.A., Kiah M.L.M., Zaidan B.B., Zaidan A.A., A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm, J. Applied Sci., 10, pp. 59-64, (2010)
  • [3] Al-Azawi A.F., Fadhil M.A., Arabic text steganography using kashida extensions with huffman code, J. Applied Sci., 10, pp. 436-439, (2010)
  • [4] Alghathbar K., Code based hashing technique for message authentication algorithms, J. Inform. Assurance Security, 5, pp. 9-20, (2010)
  • [5] Aura T., Nikander P., Leiwo J., DOS-Resistant Authentication with Client Puzzles, (2000)
  • [6] Bhaumik A.K., Choi M., Robles R.J., Balitanas M.O., Data hiding in video, Int. J. Database Theory Appl., 2, pp. 9-16, (2009)
  • [7] Biham E., Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at Eurocrypt'91, (1991)
  • [8] Chae J.J., Manjunath B.S., Data hiding in video, Proceedings of the 6th IEEE International Conference on Image Processing, pp. 243-246, (1999)
  • [9] Chang C.C., Chen T.S., Cheng L.Z., A steganographic method based upon JPEG and quantization table modification, Inform. Sci., 141, pp. 123-138, (2002)
  • [10] Chang C.C., Tseng H.W., Steganographic method for digital images using side match, Pattern Recognition Lett, 25, pp. 1431-1437, (2004)