• Corpus ID: 1142947

Development Trends in Steganography

  title={Development Trends in Steganography},
  author={Elzbieta Zielinska and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={arXiv: Multimedia},
Steganography is a general term referring to all methods for the embedding of additional secret content into some form of carrier, with the aim of concealment of the introduced alterations. The choice of the carrier is nearly unlimited, it may be an ancient piece of parchment, as well as a network protocol header. Inspired by biological phenomena, adopted by man in the ancient times, it has been developed over the ages. Present day steganographic methods are far more sophisticated than their… 

Figures and Tables from this paper

This paper proposes simple, yet novel approach that uses the feature of English alphabets rather than modifying them, which overcome the limitation of imperceptibility, and the embedding capacity of the proposed technique is enhanced to 3-bits per characters.
Improving Steganographic capacity using distributed steganography over BMP
The overall achievement was improved capacity that doubles as the set of BMP images increases, less distortion and detectability as secrete data stays among different files.
Research on information steganography based on network data stream
This paper proposes a new type of data steganography technology based on network data flow using the network protocol itself and the relationship between data packets in the entire network data stream to perform network data Steganography, transfer hidden data, and perform secondary identity authentication.
Introduction to Steganography in RRNS based Communications
This paper takes advantage of the redundancy parameter and the correction capacity of RRNS codes, i.e., the authors hide secret data in some residues in such way that the altered number of residues does not exceed half the redundancy of the code.
Cloud-based Reversible Dynamic Secure Steganography Model for embedding pathological report in medical images
This research identified pixel space available in the medical image for storing other relevant secret information in this technique, and a new algorithm is proposed for generating secret keys.
Comparative Review on Feature-content Based of Public Key Steganography Trends
An up-to-date review on studies conducted in the field of Public Key Steganography based on feature-content of PKS which are domain, scheme, and evaluation parameter aspects, and a recommendation and good practices drawn from the reviewed literatures are provided.
The optimal LBS substitution matrix technique for image hiding
In this current research, the researcher had presented the technique of finding optimal LSB substitution matrix by changing the position of each bits within the matrix integrated withChanging the position with pixel and bit give the better result for MSE and PSNR calculating.
Data Alteration: A Better Approach to Securing Cloud Data with Encryption
This paper proposes a new approach that combines the strengths of both steganography and cryptography called Data Alteration, which aims to hide the data by modifying it completely as it remains readable, meaningful and therefore shows no suspicions to malicious cloud providers and pirates.
Covert channels in TCP/IP protocol stack - extended version-
A survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack, organized according to affected layer and protocol.
Effect of Saline Water on Germination and Vegetative Growth of Faba Bean
There is a significant difference between the height and circumference of the knee for male and female, but there is inclusive differences regarding Rt and Lt knee in normal cases.


Steganography in Digital Media: Principles, Algorithms, and Applications
This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Digital image steganography: Survey and analysis of current methods
Digital Watermarking and Steganography
Steganalysis of Images Created Using Current Steganography Software
Characteristics in current steganography software that direct the steganalyst to the existence of a hidden message are identified and the ground work of a tool for automatically detecting theexistence of hidden messages in images is introduced.
Stretching the Limits of Steganography
It was widely believed that public key steganography was impossible; it is shown how to do it and a number of possible approaches to the theoretical security of hidden communications are looked at.
Disappearing Cryptography: Information Hiding: Steganography and Watermarking
This new edition of this best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques capable of withstanding the evolved forms of attack.
Hydan: Hiding Information in Program Binaries
It is shown that this scheme to steganographically embed information in x86 program binaries can embed only a limited amount of information in each executable, although this amount is sufficient for some of the potential applications mentioned.
Information hiding-a survey
An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
StegFS: a steganographic file system
StegFS securely hides user-selected files in a file system so that, without the corresponding access keys, an attacker would not be able to deduce their existence, even if the attacker is thoroughly familiar with the implementation of the file system and has gained full access to it.
PadSteg: introducing inter-protocol steganography
Basing on real network traces, it is confirmed that PadSteg is feasible in today’s networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.