Data Hiding Using Video Steganography - A Survey
Data Hiding Using Video Steganography - A Survey
Data Hiding Using Video Steganography - A Survey
Prajith V
Kshema V
Department of Computer Science and Engineering
Jawaharlal College of Engineering and Technology
AbstractDigital data communication has become an
integral part of infrastructure nowadays. In this tech era, with
the increasing importance of internet and the fast
communication
techniques,
the
security
and
the
confidentiality of the sensitive data has become of prime
concern. This has resulted in an unpredictable growth in the
field of information hiding. Cryptography and steganography
are the two popular methods available to provide security.
One hides the existence of the message and the other distorts
the message itself. Steganography is a technique to hide secret
information in some other media without leaving any
apparent evidence of data alteration. It comes under the
assumption that if the feature is visible, the point of attack is
evident, thus the objective of steganography is always to
conceal the very existence of the secret data. This paper
provides a state-of-the-art review and analysis of the different
existing methods of video steganography and also covers
classification and applications.
Keywords- Cover Media, Cryptography, Data Hiding, LSB,
Security, Steganography
I. INTRODUCTION
The cutting edge of technology and the Internet have made
a breakthrough in the existence of data communication.
Communication is the lifeblood of any organization and is
one of the most important needs of human beings. The
concept of secret communication is as old as
communication itself. It is often thought that
communications can be made secure by using encryption
techniques, but this is not really true in practice. Encryption
provides an obvious approach to information security, and
encryption programs are readily available. However,
encryption clearly marks a message as containing
interesting information, and the encrypted message
becomes subject to attack. Furthermore, in many cases it is
desirable to send information without anyone even noticing
that information has been sent secret information. The
history teaches that is better hiding messages rather than
enciphering them, because it arouses less suspicion. This
preference persists in many operational contexts till up this
day.
Data security basically aims at preserving the
confidentiality and integrity of data and protecting the data
from unauthorized users or hackers. Many techniques such
as digital watermarking, cryptography and steganography
were developed in order to enhance the data security.
Cryptography is an art or science of ciphers that use
206
207
IV IMAGE STEGANOGRAPHY
Image steganography techniques can be divided into
following domains.
Spatial Domain Methods
Transform Domain Technique
Distortion Techniques
Masking and Filtering
A. Spatial Domain Methods
There are many versions of spatial steganography, all
directly change some bits in the image pixel values in
hiding data. Least significant bit (LSB)-based
steganography is one of the simplest techniques that hides a
secret message in the LSBs of pixel values without
introducing many perceptible distortions. Changes in the
value of the LSB are imperceptible for human eyes. Spatial
domain techniques are broadly classified as follows based
on the techniques used for hiding data.
1. Least significant bit (LSB)
2. Pixel value differencing (PVD)
3. Edges based data embedding (EBE)
4. Quantization index modulation(QIM)
5. Random pixel embedding (RPE)
6. Pixel Mapping method
7. Multiple-Based Notational System
8. Difference Expansion Technique
9. Gray level modification (GLM)
10. Labelling or connectivity method
11. Pixel intensity based method
12. Texture based method
13. Histogram shifting methods
1) Least Significant Bit (LSB)
The simplest approach for embedding information in cover
image is using Least Significant Bits (LSB). The idea of the
LSB algorithm is to insert the bits of the hidden message
directly into the least significant bit plane of the cover
image in a deterministic sequence. As the LSB method is
designed by taking the advantage of human vision system
and as the amplitude of the change is small, modulating the
least significant bit does not result in human-perceptible
difference. Because this method uses bits of each pixel in
the image, it is necessary to use a lossless compression
format, otherwise the hidden information will get lost in the
transformations of a lossy compression algorithm. The
Least Significant Bit insertion varies according to the type
of image. For an 8 bit image, the 8th bit of each byte of the
image is replaced with the bit of secret message. For 24 bit
image, the LSB bit of each of the red, green and blue color
components are changed.
Since the compression in BMP is lossless, LSB is effective
in using BMP images. But for hiding the secret message
inside BMP image using LSB algorithm it requires a large
cover image. GIF formats also supports LSB substitution,
but the problem with the GIF image is that whenever the
least significant bit is changed the whole color palette will
be changed. This problem can be solved by using the gray
scale GIF images since the gray scale image contains 256
shades and the changes will be done gradually so that it
will be very hard to detect. Since JPEG uses lossy
compression, the direct substitution of steganographic
techniques is not possible in JPEG images. So it uses LSB
208
209
210
V AUDIO STEGANOGRAPHY
In audio steganography, secret message is embedded into
digitized audio signal as noise at a frequency out of human
hearing range. The embedding process will result a slight
alteration of binary sequence of the corresponding audio
file but the alterations made to the audio file are
perceptually indiscemible. The characteristics of audio
signal such as unpredictable nature and characteristic
redundancy make them ideal candidate to be used as a
cover for covert communications to conceal secret
messages. The audio steganographic process mainly
consists of following two steps:
1) Identification of redundant bits in the audio file:Redundant bits are those bits that can be modulated without
destroying the integrity or corrupting the quality of the
cover media. Hence those redundant bits are chosen as the
candidate for holding secret information.
2) Embedding the secret information in the audio file:- The
redundant bits in the cover file is replaced by the bits of the
secret information.
Due to the existence of advanced audio steganography
schemes and the very nature of audio signals to be highcapacity data streams, audio steganalysis is very difficult
and requires scientifically challenging statistical analysis.
There have been many techniques for hiding information or
messages in audio some of the common approaches
include
A. Low-Bit Encoding
It is also known as LSB encoding. The low-bit encoding
replaces the least significant bit in some bytes of the
digitized audio file to hide a sequence of bytes containing
the secret data. Since the LSB substitution doesn't cause
significant quality degradation, such as in 24-bit bitmaps,
this is usually an effective technique. In computing, the
least significant bit (LSB) is the bit position in a binary
integer giving the units value, that is, determining whether
the number is even or odd. The LSB is sometimes referred
to as the right-most bit, due to the convention in positional
notation of writing less significant digit further to the right.
Though this method is simple and have greater embedding
capacity, the method cannot provide protection to the
hidden message against small modifications that can arise
as a result of format conversion or lossy compression.
B. Phase Coding
In phase coding technique, the phase of a cover audio
segment is replaced with a reference phase that represents
the secret information. In order to preserve the relative
phase between segments, the remaining segments phase is
adjusted. In terms of signal to noise ratio, Phase coding is
one of the most effective coding methods. This method
relies on the fact that the phase components of sound are
not as perceptible to the human ear as noise is. Message
bits are encoded as phase shifts in the phase spectrum of a
digital signal. This leads to inaudible encoding in terms of
the Signal-to-Perceived Noise Ratio (SPNR) and the secret
message gets camouflaged in the audio signal, not
detectable by the steganalysis methods based on SPNR.
Thus, phase coding addresses the disadvantages of the
noise-inducing methods of audio steganography. When
there is a drastic change in the phase relation between each
211
212
[1]
[2].
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
213
REFERENCES
Masoud Nosrati , Ronak Karimi Mehdi Hariri,An introduction to
steganography methods, World Applied Programming, Vol 1,
August 2011.
J. Tian, Reversible data embedding using a difference expansion.
IEEE Transactions on Circuits and Systems for Video Technology,
13, 8, PP 890896, 2003.
Wu D. C and Tsai W. H. (2003), A steganographic method for
images by pixel-value differencing", Pattern Recognition Letters,
Vol. 24, no. 9-10, pp. 1613-1626.
Wu H.C., et al., Image Steganographic scheme based on pixelvalue differencing and LSB replacement methods, VISP(152), 2005
Mehdi Hussain and Mureed Hussain, A Survey of Image
Steganography Techniques International Journal of Advanced
Science and Technology Vol. 54, May, 2013
N. F. Johnson and S. Katzenbeisser, A Survey of steganographic
techniques. in Information Hiding Techniques for Steganography
and Digital Watermarking,S.Katzenbeisser and F.Petitcolas, Ed.
London: Artech House, pp. 43-78,2000.
H. S. Majunatha Reddy and K. B. Raja, High capacity and security
steganography using discrete wavelet transform. International
Journal of Computer Science and Security. pp. 462-472,2009.
S. C. Katzenbeisser. Principles of Steganography. in Information
Hiding Techniques for Steganography and Digital Watermarking,
S. Katzenbeisser and F. Petitcolas, Ed. London: Artech House, pp.
43-78,2000.
P. Kruus, C. Scace, M. Heyman, and M. Mundy., A survey of
steganography techniques for image files . Advanced Security
Research Journal,2003, pp. 41-52.
Jayaram P, Ranganatha H R, Anupama H S, Information hiding
using audio steganography A survey,The International Journal of
Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
,DOI : 10.5121/ijma.2011.3308 86.
B.C. Nguyen, S.M. Yoon et H.-K. Lee : Multi bit plane image
steganography. Proc. Digital Watermarking, 5th International
Workshop, IWDW 2006, volume 4283 de Lecture Notes in
Computer Science, pages 61 70, Jeju Island, Korea, novembre
2006. Springer.
D.C. Wu. and W.H. Tsai.,A steganographic method for images by
pixel value differencing, Pattern Recognition Letters, 24:16131626,
2003.
Potdar V.and Chang E. Gray level modification steganography for
secret communication. In IEEE International Conference on
Industria l Informatics. pages 355368, Berlin, Germany, 2004.
Xinpeng Zhang and Shuozhong Wang. Steganography using
multiple-base notational system and human vision sensitivity. IEEE
Signal Processing Letters, 12(1):67{70, 2005.
B. Chen and G.W. Wornell. Quantization index modulation: A class
of provably good methods for digital watermarking and information
embedding. IEEE Transactions on Information Theory,
47(4):1423{1443, 2001.
K. Gopalan and S. Wenndt, Audio Steganography for Covert
DataTransmission by Imperceptible Tone Insertion, WOC 2004,
Banff,Canada July 8 10, 2004.
Prince Kumar Panjabi, Parvinder Singh,Ph.D,, An Enhanced Data
Hiding Approach using Pixel Mapping Method with Optimal
Substitution Approach, International Journal of Computer
Applications (0975 8887) Volume 74 No.10, July 2013
http://www.steganosaur.us/
Souvik Bhattacharyya and Gautama Sanyal. Study and analysis of
quality of service in different image based Steganography using
PMM. International journal of applied information system
foundation of computer science, New York, USA 2012
Souvik Bhattacharyya and Gautam Sanyal. PMM (Pixel Mapping
method) Based Bit plane complexity onsegmentation (BPCS)
Steganography. 2011 IEEE