IJMSC Vol. 6, No. 4, 8 Aug. 2020
Cover page and Table of Contents: PDF (size: 1162KB)
Full Text (PDF, 1162KB), PP.42-69
Views: 0 Downloads: 0
Information Security, MATLAB, Performance Metrics, Steganography Mechanism.
Organisations need information security to reduce the risk of unauthorized information disclosure, use, modification and destruction. To avoid this risk and ensure security diverse solutions are available such as Cryptography, Steganography and Watermarking. Encryption changes the form of information but latter two hide records or watermark in some medium. This paper is an effort to explore one of the solutions i.e. Steganography. It is a mechanism of hiding secret information in text, image, audio or video carriers. Broadly, these are classified in various categories such as Spatial domain, Transform domain and Distortion Technique. This work intends to give an overview of above mentioned techniques in detail by comparing algorithms based on performance metrics such as Bhattacharyya Coefficient, Correlation Coefficient, Intersection Coefficient, Jaccard Index, MAE, MSE, PSNR and UIQI. After analysing the MATLAB simulation and comparison based on different performance metrics, LSB Substitution and Pseudorandom technique are best suited for generating highly matched stego image with respect to their cover image.
Pooja Yadav, Sangeeta Dhall. " Comparative Analysis of Steganography Technique for Information Security ", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.6, No.4, pp.42-69, 2020. DOI: 10.5815/ijMSC.2020.04.05
[1]Sangeeta Dhall, Bharat Bhushan and Shailender Gupta, “An In-depth Analysis of Various Steganography Techniques” in International Journal of Computer Networks and Applications Volume 2, Issue 1 (2015)
[2]Karthikeyan B, Asha S, and Poojasree B, “Gray Code Based Data Hiding in an Image using LSB Embedding Technique” in International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-1, May 2019
[3]Afsha Shaukat Mahesh Chaurasia and Prof. Goutam Sanyal,”A Novel Image Steganography Technique using Fast Fourier Transform” in Fifth International Conference On Recent Trends In Information Technology 2016.
[4]N Sathisha1, K Suresh Babu2, K B Raja2, and K R Venugopal ,“Image Steganography Based on Mantissa Replacement using LWT” in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 2, February 2015.
[5]Priyanka Chouksey, and Dr. Prabhat Patel, “Secret Key Steganography technique based on three-layered DWT and SVD algorithm” in International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 9 - May 2016
[6]Er. Babita Sant, “A Review: Network Security Based On Cryptography & Steganography Techniques” in International Journal of Advanced Research in Computer Science Volume 8, No. 4, May 2017.
[7]Sangeeta Dhall, Bhuvnesh Kumar and Rashmi Chawla, ”A Comprehensive Analysis of Various Steganography Techniques Under Different Attacks” in IEEE Conference ID: 40353 2017 4th International Conference.
[8]https://www.hipaajournal.com/healthcare-data-breach-statistics/
[9]Preeti Kumari and Ridhi Kapoor, “Image Steganography for Data Embedding & Extraction using LSB Technique” in International journal of Computer Applications & Information Technology- Volume 9 Issue 2, July 2016.
[10]Divya.A1 and S.Thenmozhi, “Steganography: Various Techniques In Spatial and Transform Domain” in International Journal of Advanced Scientific Research and Management, Vol. 1 Issue 3, March 2016.
[11]K.Thangadurai and G.Sudha Devi, “An analysis of LSB Based Image Steganography Techniques” in International Conference on Computer Communication and Informatics , Jan. 2014, Coimbatore, INDIA.
[12]Anita Pradhan, Aditya Kumar Sahu, Gandharba Swain and K. Raja Sekhar, “Performance Evaluation Parameters of Image Steganography Techniques” in International Conference on Research Advances in Integrated Navigation System, April, 2016.
[13]Ali Sheidaee and Leili Farzinvash, “A Novel Image Steganography Method Based on DCT and LSB” in 9th International Conference on Information and Knowledge Technology, October, 2017.
[14]Rupali Bhardwaj and Vaishali Sharmab,“Image Steganography Based on Complemented Message and Inverted bit LSB Substitution” in 6th International Conference On Advances In Computing & Communications,September, 2016.
[15]Vijay Kumar and Dinesh Kumar, “Performance Evaluation of DWT Based Image Steganography” in IEEE 2nd International Advance Computing Conference, 2010.
[16]Hanaa A. Abdallah, Mohiy M. hadhoud and Abdalhameed A. Shaalan , “An Efficient SVD Image Steganographic Approach”in IEEE, 2009.
[17]Rejani. R, Dr. D. Murugan and Deepu.V.Krishnan, “Comparative Study of Spatial Domain Image Steganography Techniques” in Int. J. Advanced Networking and Applications Volume: 07, 2015.