28 research outputs found

    Video Steganography Techniques: A Survey

    Get PDF
    In digital world, information security is the major issue in digital communication on a network from the third party hackers. Steganography techniques play an important role in information security. These are the secure techniques, used for concealing existence of secret information in any digital cover object viz. image, audio, video files. In last several decades, significant researches have been done on video and image steganography techniques because data embedding and data extraction is very simple. However, many researchers also take the audio file as a cover object where robustness and undetectability of information is very difficult task. The main objective of steganography is hiding the existence of the embedded data in any digital cover object. Steganography technique must be robust against the various image-processing attacks. Nowadays, video files are more accepted because of large size and memory requirements. This paper intends to provide a survey on video techniques and provide the fundamental concept of the steganography and their uses

    Pixel value differencing steganography techniques: Analysis and open challenge

    Get PDF
    Steganography is the science of secret data communication using carrier medium, such as images, videos, text, and networks. Image steganography is majorly divided into spatial and frequency domains. Pixel value differencing (PVD) considered as good steganographic algorithm due to its high payload and good visual perception in spatial domain. The purpose of this paper is two folded. First is the critical analysis of current PVD methods using evaluating parameters (payload, visual quality and resistance of attacks) and secondly it highlights the current promising directions on PVD steganographic research

    A review and open issues of multifarious image steganography techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetch more attention due fast growth of using internet, it is applied for sending secret information by using different techniques. Steganography is one of major important technique in information hiding. Steganography is science of concealing the secure information within a carrier object to provide the secure communication though the internet, so that no one can recognize and detect it’s except the sender & receiver. In steganography, many various carrier formats can be used such as an image, video, protocol, audio. The digital image is most popular used as a carrier file due its frequency on internet. There are many techniques variable for image steganography, each has own strong and weak points. In this study, we conducted a review of image steganography in spatial domain to explore the term image steganography by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2014 to 2017. The aims of this review is provides an overview of image steganography and comparison between approved studies are discussed according to the pixel selection, payload capacity and embedding algorithm to open important research issues in the future works and obtain a robust method

    Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks

    Get PDF
    The traditional pixel value differencing (PVD) steganographical schemes are easily detected by pixel difference histogram (PDH) analysis. This problem could be addressed by adding two tricks: (i) utilizing horizontal, vertical, and diagonal edges and (ii) using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for 2×3-pixel blocks is known as variant 1, and the proposed adaptive PVD for 3×2-pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide data bits using the middle column pixels for detecting the horizontal and diagonal edges. Similarly, for every block in variant 2, the four corner pixels are used to hide data bits using the middle row pixels for detecting the vertical and diagonal edges. The quantization ranges are adaptive and are calculated using the correlation of the two middle column/row pixels with the four corner pixels. The technique performs better as compared to the existing adaptive PVD techniques by possessing higher hiding capacity and lesser distortion. Furthermore, it has been proven that the PDH steganalysis and RS steganalysis cannot detect this proposed technique

    Review Paper on Image and Video Based Steganography

    Get PDF
    مع التطور الكبير في تقنيات المعلومات الإلكترونية والشبكات ، وفي ضوء بعض الظروف التي تفرض العمل على الإنترنت ، والتي تعتبر بيئة غير آمنة للمعلومات السرية ، أصبح الحفاظ على أمن البيانات ذات أولوية مهمة. من أهم التقنيات المستخدمة للحفاظ على سرية البيانات المنقولة وعدم إخضاعها للمهاجمين هي الإخفاء والتشفير ، وتعتمد هاتان التقنيتان أيضًا على الوسيط الذي ينقل البيانات السرية ، سواء كان ملف صورة أو صوت أو فيديو. علم إخفاء المعلومات هو علم دمج البيانات الرقمية بطريقة لا يمكن لأحد الشك في وجودها. التشفير هو تقنية أخرى تستخدم لحماية البيانات ، عند استخدامه مع إخفاء المعلومات يزيد من قوة حماية المعلومات. تقدم هذه الورقة لمحة عامة عن تقنيات إخفاء المعلومات النصية داخل ملفات الصور والفيديو. تهدف هذه الدراسة إلى تقديم ملخص للطريقة الأكثر أمانًا وأمانًا وقدرة حمولتها على إخفاء البيانات.With the great development in electronic and network information technologies, and in light of some circumstances that impose work on the Internet, which is considered to be an insecure environment for confidential information, therefore maintaining data security has become an important priority. The most important techniques used to maintain the confidentiality of the transferred data and not subject it to attackers are concealment and encryption, and these two technologies also depend on the medium that transmits the secret data, whether it is an image file, sound or video. Steganography is the science of embedding digital data in such a way no one can doubt its existence. Encryption is another technology used to protect data, when used with steganography increases the power of information protection. This paper provides an overview of techniques for hiding textual information within image and video files. This study aims to provide a summary of the method that is safer, more secure, and the ability of its payload to hide data
    corecore