Professional Documents
Culture Documents
Professor & Head Department of Information Technology Govind Ballabh Pant University of Agriculture &
Technology,Pantnagar ,
ABSTRACT
Stegnography is the process of hiding data behind some form
of multimedia file or network protocol. Stegnography can be
categorized as follows based on the medium in which we are
hiding the data i.e Text,Image,Audio,Video and Network
Protocol and is referred to as Text Stegnography,Image
Stegnography,Audio Stegnography Video Stegnography and
Network or Protocol Stegnography respectively.This paper
presents a review on the work done on Image and Text
Stegnography and apart from this Stegnography advantages
and disadvantages are also discussed.
1. Introduction
Over the last few decade with the advent of internet,most
of the data transmission takes place through it.But one of
the foremost requirement with this mode of transmission
is to provide secure communication. Therefore
Stegnography is required and gaining popularity.The
word Steganography,is framed from the two Greek words
stegos, meaning roof or covered andgraphia which means
writing. Stegnographyis defined as a process of hiding
data behind some form of multimedia file eg.
Image,video,textetc or network protocols so as to ensure
confidentiality.This method of sending messages in
hidden form in a communication is not new rather its very
old.In ancient greek times messengers used to tattoed
messages on there shaved head and then let hair grow so
that the message remained unseen[1].In World War II
invisible inks were one such popular technique used for
communication[1].Even
later,Germans
developed
microdots for transferring messages in hidden format.
Microdots are photographs with size of a printed period.
The microdots are then printed in a letter or on an
envelope and being so small ,they could be sent
unnoticed[1].After the event of 11 September 2001 it was
believed by the United States agencies that Osama Bin
Laden
and
Al-Qaeda
use
stegnography
for
communication.
This paper is divided into seven parts-:first part gives
Introduction about the topic, second part and third part
describes the Stenographic System and the types of
Stegnography respectively,fourth part explains and gives
Literature Review associated with the Text and Image
Stegnography,fifth part provides Advantages and
Disadvantages of Stegnography and lastly sixth and
2. Stegnographic system
Figure 2.1 shows a Stegnographic System. Stegnographic
System consist of five major parts.They are as follows[12]:
1 Cover->defined as the medium used to hide the secret
message.
2 Stego Key-> It is a Key used by Embedding and
Extracting Algorithm for hiding and extracting data from
cover respectively.
3 Embedding/Encoding Algorithm->Algorithm used for
hiding data behind cover.
4 Extracting/Decoding Algorithm->Algorithm used for
extracting data from the cover.
5 Stego.
Page 2
5.Advantages
Stegnography
&
Disadvantages
of
6. Conclusion
Stegnography is an art of hiding data so that only the
sender and receiver are aware of the message and not the
third person.Since the year 1995 there have been much
research in the field of text and image stegnography.From
the year 1995 to 2005 punctuation marks, white
spaces,synonyms and line and word shifting were some of
the techniques that were used for hiding the secret data or
message behind the text cover.From the year 2006 to till
date simple&compound letters,emotion icons,Pangram
and image medium,Html documents,css,executable files
and using words with different spellings were some of the
other techniques proposed for text stegnography and now
if we talk about research in image stegnography since
1995 to till date a new perfect hashing based approach for
grey scale images,combining cryptography stegnography
with watermarking,technique making use of 2 cover
images and one stego image which enables providing high
security,using LSB in order to hide data in digital
images,and hiding data in Intermediate Significant Bit
Planes are some of the techniques being used for image
stegnography.
References
[1.] D.Kahn,the Codebreakers, Macmillan, New York,
1967.
Page 3
Author
Bhoomika Pandey received the B.tech degree in
Information Technology from Roorkee Institute of
Technology Roorkee in 2013. At present pursuing her
M.tech in Information Technology from G.P.U.A.T.
Pantnagar India and has interest in networking.
Page 4