Volume 13 Issue 2 - April 2019

  • 1. Image steganography: review study

    Authors : Haval Muhammed Sidqi, Muzhirshaban Al-ani

    Pages : 27-34

    DOI : http://dx.doi.org/10.21172/1.132.05

    Keywords : SecurityInformation HidingSteganography Stego-image

    Abstract :

    The evolving of Internet technology has achieved to the need of high level of data safety during its spread. For this purpose steganography shows a main role in society. Steganography is mostly the art of secretly hiding data or message in any cover media such as an image, audio or video. Hence it allows secret communiqué to take place without the information of any unintended user. This article gives a brief overview of image steganography and the techniques used for hiding data in the original image to get stego-image. The estimate of performance is based on the PSNR value. The aim of Steganography is to maintain secret communication between two events. This paper shows how Steganography is used in a new situation while providing a practical understanding of what Steganography is and how to complete it. In this research there exists a large change of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different techniques have different requirements of the steganography method used. After studying and analyzing of the research papers, the following gaps are identified: 1) the essential of multi-level key security with random key generation is arises so that the data security will become more robust. 2) The length of the key should be maximized up to 256 to 512 bytes. 3) The grouping of cryptography with steganography is a stronger way to enhance the security. 4)The uses of steganography ways with the help of image encryption enhance the retrieval complexity. This paper presents a relative study of many procedure steganalysis techniques. It investigated and compared the performances of each technique in the detection of embedding methods considered. Based on the results of our analysis, this paper provides information as to which specific steganalysis technique needs to be used for a particular steganography method. Finally, we suggest a procedure which may help a legal examiner to agree an order in which different steganalysis methods need to be measured in the detection process to complete the best finding results in terms of together time and accuracy.

    Citing this Journal Article :

    Haval Muhammed Sidqi, Muzhirshaban Al-ani, "Image steganography: review study", Volume 13 Issue 2 - April 2019, 27-34