Utilizing the Most Recent App for Confidential Communication in the Local Area Network

Abstract

The technique known as steganography involves hiding information within the information of others in order to mask the fact that communication is taking place. Nonetheless, digital photos are the most widely used carrier format because of their widespread availability online. A photo contains a lot of sensitive steganography data. While some are more complex and powerful than others, they all have their strengths and weaknesses. Depending on the application, the steganography technology used must adhere to certain specifications. For example, some applications might require that the secret data be hidden completely, while others might require that a more significant secret message be hidden. The objective of this project is to present an overview of the techniques and applications of image steganography. Additionally, it attempts to clarify what constitutes a good steganography.

Country : Sultanate of Oman

1 Raqiya Saud Ahmed Al Harthi2 Braah Mubarak Al-Dhafri3 Dr. Ramesh Palanisamy

  1. Student, Department of Information Technology, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  2. Student, Department of Information Technology, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  3. Lecturer, Department of Information Technology, University of Technology and Applied Sciences – Ibra, Sultanate of Oman

IRJIET, Volume 7, Issue 12, December 2023 pp. 182-188

doi.org/10.47001/IRJIET/2023.712026

References

  1. Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf
  2. Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
  3. Dunbar, B., “Steganographic techniques and their use in an Open-Systems environment”, SANS Institute, January 2002.
  4. Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001.
  5. N.F. Johnson and S. Jajodia. (1998, Feb.). “Exploring steganography: seeing the unseen.” IEEE Computer Journal. [On line]. 31(2), pp. 26-34. Available: http://www.jjtc.com/pub/r2026.pdf [Jun. 2011].
  6. Aldawood, H. and Skinner, G. (2019) “Reviewing cyber security social engineering training and awareness programs—pitfalls and ongoing issues,” Future Internet, 11(3), p. 73. Available at: https://doi.org/10.3390/fi11030073.
  7. Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001.
  8. Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998.
  9. Marvel, L.M., Boncelet Jr., C.G. &Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999.
  10. N.F. Johnson and S. Jajodia. (1998, Feb.). “Exploring steganography: seeing the unseen.” IEEE Computer Journal. [On line]. 31(2), pp. 26-34. Available: http://www.jjtc.com/pub/r2026.pdf [Jun. 2011].
  11. Secure binary image steganography using F5 algorithm based on data ... (n.d.). Retrieved April 30, 2023, from https://www.researchgate.net/publication/309068311_Secure_binary_image_steganography_using_F5_algorithm_based_on_data_hiding_and_diffusion_techniques 
  12. H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia,vol. 9, no. 3, pp. 475–486, 2007.
  13. R.Poornima, R.J.Iswarya, “An Overview of Digital Image Steganography”, International Journal of Computer Science & Engineering Survey (Vol.4, No 1), February 2013.
  14. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith D. (eds.):Information Hiding: 2nd International Workshop. Lecture Notes in Computer Science, Vol.1525. Springer-Verlag, Berlin Heidelberg New York (1998) 306–318.
  15. Chandramouli, R. and Memon, N.: Analysis of LSB Based Image SteganographyTechniques. Proceedings of ICIP 2001 (CD version). Thessaloniki, Greece (2001).
  16. Fridrich, J., Goljan, M., and Du, R.: Detecting LSB Steganography in Color and GrayscaleImages. Magazine of IEEE Multimedia: Special Issue on Security, Vol. Oct-Dec (2001) 22–28.
  17. Katzenbeisser, S. and Petitcolas, F.A.P.: On Defining Security in SteganographicSystems.Proceedings of SPIE: Electronic Imaging 2002, Security and Watermarking of MultimediaContents, Vol. 4675. San Jose, California (2002).
  18. Anderson, R.J. and Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications: Special Issue on Copyright and Privacy Protection), Vol. 16(4) (1998) 474"481.
  19. T. Filler, J. Judas, and J. J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920–935, Sept. 2011.