Analysis of Stenography
Analysis of Stenography
ISSN No:-2456-2165
Analysis of Stenography
Udit Kalra
1
B.Tech Scholar, Department of IT, Maharaja Agrasen Institute Of Technology, Delhi
Abstract:- Ransacking for just the right article is the disadvantage is that if someone gives sufficient time, then
foremost preferred and is sort of challenging to look out the person can easily decrypt the encrypted text.
supported the current requirements. With the
advancement in technology day by day, the occurrence To overcome this issue data is embedded within some
of hacking is increasing very often. In these modern digital media in such a way that nobody can easily extract it.
times, the area of cybersecurity is in desperate need of This better solution is stenography.
prevention from hacking. Gone are those days when
firewalls were handy to protect your data. We require to Steganography is the practice of hiding a message, an
try to do this individually to prevent cybercrime. In image, a file or any significant data within another message,
keeping with Kaspersky Labs, the standard cost of a image, or file to make sure it is safe.
cyber-breach is $1.23 million. This paper is on the brink
to give the simplest possible ways to assist and helping to Unlike cryptography, stenography's goal is to
secure data by concealing. Security of data has become a thoroughly hide the presence of any data rather than hiding
vital challenge because of common vulnerabilities and its content. Imperceptibility, embedding dimensions and
day-to-day hacking. Data Hiding/ Encapsulation can be robustness are the major problems with image
done in many ways. Some methods to protect your data steganography.
are cryptography and steganography. Once you know
that your data is safe and cannot be misused by someone, The main objective of this project is to classify the
I think when might be less accentuated. Steganography, different types of stenographic methods, their advantages
a non-orthographic and syllabic-ideographic and their implementation [16]. This paper has been divide
orthography, maybe a model to research different into many sections. The previous one was abstract. Section I
hemispheric reading processes in Western subjects. I is that the introduction of the subject. Section II is about
have thoroughly researched the most general Related Work. It contains information about the topic and
stenographic methods and created a live environment to some work related to this paper. In, Section III there is a
hide your message using an image. During this paper, I comparison between stenography and cryptography. Section
have discussed in detail what steganography is. What are IV is about the methodology of stenography is performed.
its advantages? Its types and finally discussed about the Section V is about the implementation and result. It contains
environment which I created. snapshots of how encryption and decryption were done.
Section VI is all that says the conclusion and future scope on
Keywords:- Hacking, Cyber Security, Data Hiding, my research. In the end, there are some References to some
Application Security, Encapsulation, Cryptography, other research papers.
Steganography.
II. RELATED WORK
I. INTRODUCTION
Stenography's first use has been traced back to 440 BC
In this world of digitalization, several businesses and when ancient Greece people wrote messages on wood and
corporations are often the victims of malicious attacks by coated it with wax, which acted as the means of covering
hackers who wish to steal customer data. Several companies [9]. Also, Romans used various types of Invisible In1ks.
understand the use of the word protection and as a result, And to decipher these hidden messages, light or heat were
they use various cryptographic techniques to encrypt their the means used. During World War II, the Germans
data and decrypt it in future when required to be used. A introduced microdots. Here, they reduced the size of every
minute change or a minute error can cause colossal damage file to the size of a dot and attached it with the paperwork.
[16]. Therefore handled carefully to allow the best possible Now, we have many modern stenographic techniques and
results. Many researchers try to search for a praiseworthy tools to make sure that our data remains secret [14]. The
solution to unravel these problems. most suitable cover media for stenography is image
stenography. Other types of stenographic methods are text,
The growing use of the web must store, send and video, audio and network stenography.
receive personal information in an exceedingly secured
manner. For this, we may adopt an approach that may Types of Stenography
transfer the data into different forms through encryption and
then convert it into the original format using decryption [4], 1. Text Stenography
[6], [9]. However, this method has a disadvantage. The Text Steganography, as the name suggests, means
hiding information inside the text files [2], [17]. It involves
IJISRT21JUN243 www.ijisrt.com 35
Volume 6, Issue 6, June – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
process like changing the form of existing text, changing three techniques for message hiding, the transform
terms within a text, creating random character sequences, or technique has been employed in embedding the message by
making use of context-free grammars to come up with changing coefficients during a transform domain.
readable texts [7]. Different methods accustomed to
covering the data within the text are Format Based Method, After going through these five types of stenography, I
Random and Statistical Generation, and Linguistic Method. created an environment that works on Image stenography.
Here one can store a message in an image, maintain more
2. Audio Stenography security and use comparatively less space.
In audio steganography, the information is hidden
inside an audio signal which modifies the binary sequence III. STENOGRAPHY AND CRYPTOGRAPHY
of the analogous audio file [17]. Hiding a secret message
inside the audio is a way tougher process than compared Stenography and cryptography are closely related.
with others like Image or Text Steganography [7]. Different Cryptography jumbles messages in such an order that one
methods accustomed to covering the data with audio include cannot understand them [3]. Whereas in steganography, the
Least Significant Bit Encoding, Parity Encoding, Phase message is hidden so that there is no awareness of the
Coding and Spread Spectrum. In this method, the data is existence of a message. In cryptography, the structure of
hidden with WAV, AU, and MP3 type sound files. data can be altered, whereas, in stenography, the structure of
data remains the same. Stenography supports only
3. Video Stenography Confidentiality and Authentication whereas, Cryptography
In Video stenography, the information is hidden inside supports all Confidentiality, Authentication, Data Integrity
a video type format [17]. The advantage of this type of and Non-repudiation [15]. The message in stenography may
stenography is that a lot of data can be hidden, and the or might not be encrypted. If it's encrypted, then a
reason is the size and the fact that it is a moving stream of cryptanalysis technique is applied to extract the message.
images and audios. One can say that this is the combination Sometimes, sending an encrypted message can arouse
of Image Steganography and Audio Steganography [7]. Two suspicion while an invisible message will not do so. But,
main categories of Video Steganography comprise: both methods combined can provide better protection of a
Embedding data in uncompressed raw video and message. In case one method fails the message can be
compressing it later or Embedding data directly into the detected. But, it will be of still of no use because it is also
compressed data stream. encrypted using the second method.
IJISRT21JUN243 www.ijisrt.com 36
Volume 6, Issue 6, June – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
After this, the user has to download this image. Once These are the steps one needs to follow:-
downloaded, the user can decrypt to get the hidden message.
For decryption, the user has to upload the downloaded 1. Enter your message :-
image, and once it is done, the entered message is displayed A text area is displayed, and the user has to enter the
as the output. message which he/she wants to hide.
IJISRT21JUN243 www.ijisrt.com 37
Volume 6, Issue 6, June – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
REFERENCES
IJISRT21JUN243 www.ijisrt.com 38