A New Approach of Steganography on Image Metadata
DOI: http://dx.doi.org/10.62527/joiv.8.2.2110
Abstract
Keywords
Full Text:
PDFReferences
O. F. A. Wahab, A. A. M. Khalaf, A. I. Hussein, and H. F. A. Hamed, “Hiding data using efficient combination of RSA cryptography, and compression steganography techniques,” IEEE Access, vol. 9, pp. 31805–31815, 2021, doi: 10.1109/ACCESS.2021.3060317.
Z. L. Yang, S. Y. Zhang, Y. T. Hu, Z. W. Hu, and Y. F. Huang, “Vae-stega: Linguistic steganography based on variational auto-encoder,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 880–895, 2021, doi: 10.1109/TIFS.2020.3023279.
W. Tang, B. Li, M. Barni, J. Li, and J. Huang, “An automatic cost learning framework for image steganography using deep reinforcement learning,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 952–967, 2021, doi: 10.1109/TIFS.2020.3025438.
N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.
J. Qin, Y. Luo, X. Xiang, Y. Tan, and H. Huang, “Coverless image steganography: A survey,” IEEE Access, vol. 7, pp. 171372–171394, 2019, doi: 10.1109/ACCESS.2019.2955452.
Z. Qu, H. Sun, and M. Zheng, “An efficient quantum image steganography protocol based on improved EMD algorithm,” Quantum Inf Process, vol. 20, no. 2, Feb. 2021, doi: 10.1007/s11128-021-02991-8.
X. Liao, J. Yin, M. Chen, and Z. Qin, “Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features,” IEEE Trans Dependable Secure Comput, vol. 19, no. 2, pp. 897–911, 2022, doi: 10.1109/TDSC.2020.3004708.
X. Duan, D. Guo, N. Liu, B. Li, M. Gou, and C. Qin, “A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network,” IEEE Access, vol. 8, pp. 25777–25788, 2020, doi: 10.1109/ACCESS.2020.2971528.
S. Li, M. Xue, B. Zhao, H. Zhu, and X. Zhang, “Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization,” IEEE Trans Dependable Secure Comput, pp. 1–1, Sep. 2020, doi: 10.1109/tdsc.2020.3021407.
A. A. Alsabhany, A. H. Ali, F. Ridzuan, A. H. Azni, and M. R. Mokhtar, “Digital audio steganography: Systematic review, classification, and analysis of the current state of the art,” Computer Science Review, vol. 38. Elsevier Ireland Ltd, Nov. 01, 2020. doi: 10.1016/j.cosrev.2020.100316.
M. Dalal and M. Juneja, “Steganography and Steganalysis (in digital forensics): a Cybersecurity guide,” Multimed Tools Appl, vol. 80, no. 4, pp. 5723–5771, Feb. 2021, doi: 10.1007/s11042-020-09929-9.
M. Hassaballah, M. A. Hameed, A. I. Awad, and K. Muhammad, “A Novel Image Steganography Method for Industrial Internet of Things Security,” IEEE Trans Industr Inform, vol. 17, no. 11, pp. 7743–7751, Nov. 2021, doi: 10.1109/TII.2021.3053595.
S. Dhawan, C. Chakraborty, J. Frnda, R. Gupta, A. K. Rana, and S. K. Pani, “SSII: Secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT,” IEEE Access, vol. 9, pp. 87563–87578, 2021, doi: 10.1109/ACCESS.2021.3089357.
Y. Zhao, R. Wang, W. Jia, W. Zuo, X. Liu, and W. Gao, “Deep Reconstruction of Least Significant Bits for Bit-Depth Expansion,” IEEE Transactions on Image Processing, vol. 28, no. 6, pp. 2847–2859, Jun. 2019, doi: 10.1109/TIP.2019.2891131.
C. C. Chang, “Adversarial Learning for Invertible Steganography,” IEEE Access, vol. 8, pp. 198425–198435, 2020, doi: 10.1109/ACCESS.2020.3034936.
A. A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, “A novel image steganography technique based on quantum substitution boxes,” Opt Laser Technol, vol. 116, pp. 92–102, Aug. 2019, doi: 10.1016/j.optlastec.2019.03.005.
M. Kalita, T. Tuithung, and S. Majumder, “A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution,” Computer Journal, vol. 62, no. 11, pp. 1639–1655, Nov. 2019, doi: 10.1093/comjnl/bxz014.
L. AlFaqawi, M. AbuHaya, and ..., “Alpha channel-Based Indicator For Robustness Forward/Backward LSB Steganography,” … Conference on Information …, 2021, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9636891/
Ms. B. Bhatu and H. Y. Shah, “Customized Approach To Increase Capacity And Robustness In Image Steganography,” in International Conference on Inventive Computation Technologies (ICICT), 2016.
H. Paraskevov, S. Zhelezov, and B. Uzunova-Dimitrova, “Robustness of the secret message in stego file against flip and rotation attack,” Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications, vol. 9, no. 1, pp. 5–16, 2017.
L. Ke and Z. Yin, “On the security and robustness of ‘Keyless dynamic optimal multi-bit image steganography using energetic pixels,’” Multimed Tools Appl, 2021, doi: 10.1007/s11042-020-09807-4.
S. K. Moon, “Software and hardware-based audio-video crypto steganalysis model for enhancing robustness and imperceptibility of secured data,” Multimed Tools Appl, 2022, doi: 10.1007/s11042-022-12353-w.
D. Darwis, N. B. Pamungkas, and Wamiliana, “Comparison of Least Significant Bit, Pixel Value Differencing, and Modulus Function on Steganography to Measure Image Quality, Storage Capacity, and Robustness,” in Journal of Physics: Conference Series, 2021. doi: 10.1088/1742-6596/1751/1/012039.
D. Darwis, A. Junaidi, D. A. Shofiana, and Wamiliana, “A New Digital Image Steganography Based on Center Embedded Pixel Positioning,” Cybernetics and Information Technologies, vol. 21, no. 2, 2021, doi: 10.2478/cait-2021-0021.
L. Hartmann and S. Wendzel, “How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data,” European Interdisciplinary Cybersecurity …, 2021, doi: 10.1145/3487405.3487661.
C. M. Kondasinghe, “A System to Preserve Metadata using Steganography.” 2021.
D. Darwis, A. Junaidi, and Wamiliana, “A New Approach of Steganography Using Center Sequential Technique,” in Journal of Physics: Conference Series, 2019. doi: 10.1088/1742-6596/1338/1/012063.
S. W. Bray, “Introduction to Cryptography and Python,” Implementing Cryptography Using Python®, pp. 1–30, 2020, doi: 10.1002/9781119612216.ch1.
R. Rahaeimehr, “Novel Cryptographic Authentication Mechanisms for Supply Chains and OpenStack Novel Cryptographic Authentication Mechanisms for Supply Chains and OpenStack,” 2019.
M. T. Suryadi, Y. Satria, “Implementation of the Gauss-Circle Map for encrypting and embedding simultaneously on digital image and digital text,” Journal of Physics …, 2021, doi: 10.1088/1742-6596/1821/1/012037.
R. Wazirali, Z. Chaczko, and J. Gibbon, “Steganographic image sharing app,” Proceedings - 25th International Conference on Systems Engineering, ICSEng 2017, vol. 2017-Janua, pp. 494–499, 2017, doi: 10.1109/ICSEng.2017.62.
D. Darwis, A. Junaidi, and Wamiliana, “A New Approach of Steganography Using Center Sequential Technique,” J Phys Conf Ser, vol. 1338, no. 1, 2019, doi: 10.1088/1742-6596/1338/1/012063.
O. Juarez-Sandoval, M. Cedillo-Hernandez, G. Sanchez-Perez, K. Toscano-Medina, H. Perez-Meana, and M. Nakano-Miyatake, “Compact image steganalysis for LSB-matching steganography,” Proceedings - 2017 5th International Workshop on Biometrics and Forensics, IWBF 2017, 2017, doi: 10.1109/IWBF.2017.7935103.
S. D. Muyco and A. A. Hernandez, “A modified hash based least significant bits algorithm for steganography,” ACM International Conference Proceeding Series, pp. 215–220, 2019, doi: 10.1145/3335484.3335514.
D. R. I. M. Setiadi, “PSNR vs SSIM: imperceptibility quality assessment for image steganography,” Multimed Tools Appl, vol. 80, no. 6, pp. 8423–8444, Mar. 2021, doi: 10.1007/s11042-020-10035-z.
S. D. Muyco and A. A. Hernandez, “Least significant bit hash algorithm for digital image watermarking authentication,” in ACM International Conference Proceeding Series, Association for Computing Machinery, Apr. 2019, pp. 150–154. doi: 10.1145/3330482.3330523.
S. Dhawan and R. Gupta, “Analysis of various data security techniques of steganography: A survey,” Information Security Journal, vol. 30, no. 2. Bellwether Publishing, Ltd., pp. 63–87, 2021. doi: 10.1080/19393555.2020.1801911.
M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” in IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, Jun. 2019. doi: 10.1088/1757-899X/518/5/052003.
O. Evsutin, A. Melman, and R. Meshcheryakov, “Digital steganography and watermarking for digital images: A review of current research directions,” IEEE Access, vol. 8, pp. 166589–166611, 2020, doi: 10.1109/ACCESS.2020.3022779.
G. Swain and S. K. Lenka, “A novel steganography technique by mapping words with LSB array,” International Journal of Signal and Imaging Systems Engineering, vol. 8, no. 1–2, pp. 115–122, 2015, doi: 10.1504/IJSISE.2015.067052.
O. Juarez-Sandoval, A. Fierro-Radilla, A. Espejel-Trujillo, M. Nakano-Miyatake, and H. Perez-Meana, “Cropping and noise resilient steganography algorithm using secret image sharing,” Sixth International Conference on Graphic and Image Processing (ICGIP 2014), vol. 9443, no. Icgip 2014, p. 94431S, 2015, doi: 10.1117/12.2179745.
M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process Image Commun, vol. 65, pp. 46–66, 2018, doi: 10.1016/j.image.2018.03.012.