0% found this document useful (0 votes)
18 views7 pages

From Cryptography To Steganography: Detecting Hidden Data in The Digital World

Steganography is a method used to conceal information, while steganalysis focuses on detecting hidden data. In today's digital landscape, steganography is often used across open communication channels, embedding files, videos, messages, and images within other files to obscure their content from unintended viewers. However, cybercriminals exploit these techniques to covertly transmit data to various devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

From Cryptography To Steganography: Detecting Hidden Data in The Digital World

Steganography is a method used to conceal information, while steganalysis focuses on detecting hidden data. In today's digital landscape, steganography is often used across open communication channels, embedding files, videos, messages, and images within other files to obscure their content from unintended viewers. However, cybercriminals exploit these techniques to covertly transmit data to various devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Volume 9, Issue 9, September – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24SEP937

From Cryptography to Steganography: Detecting


Hidden Data in the Digital World
Eman Daraghmi Ahmed Hamoudi
Palestine Technical University – Kadoorie Palestine Technical University - Kadoorie
Tulkarem, Palestine Tulkarem, Palestine

Abstract:- Steganography is a method used to conceal strong protection, asymmetric encryption is often preferred in
information, while steganalysis focuses on detecting scenarios where secure key exchange is difficult.
hidden data. In today's digital landscape, steganography
is often used across open communication channels, However, cryptography alone may not always be
embedding files, videos, messages, and images within sufficient to protect sensitive data from more sophisticated
other files to obscure their content from unintended attacks. While cryptography obscures the content of
viewers. However, cybercriminals exploit these messages, it does not conceal the fact that communication is
techniques to covertly transmit data to various devices. taking place. This is where steganography comes into play as
Traditional endpoint antimalware tools are not typically an additional layer of security. Steganography, unlike
designed to search for hidden data, making the detection cryptography, hides the existence of the communication itself
of steganographic content challenging. The ease with by embedding hidden messages within seemingly innocuous
which cybercriminals can transmit data using this files, such as images, audio, or video files. This makes it far
method highlights its potential threat. This paper reviews less likely that an observer will even realize that sensitive
various steganalysis tools and explores the integration of information is being exchanged.
antivirus programs for real-time detection to enhance
data confidentiality. A proof-of-concept for one of the The increasing use of steganography by cybercriminals
steganalysis tools is also provided. has raised significant concerns in the field of cybersecurity.
Cybercriminals exploit steganography to transmit malicious
Keywords:- Steganographyt; Cryptography; Cryptanalysis; payloads, command-and-control instructions, or sensitive
Forensics. stolen data without triggering traditional detection
mechanisms. The covert nature of steganography makes it
I. INTRODUCTION especially difficult for traditional antimalware tools to detect
these hidden communications, further complicating the task
The confidentiality and integrity of data are paramount of securing digital environments. For this reason,
for both organizations and individuals. Secure data steganalysis—the study and practice of detecting
transmission methods are critical to preventing tampering, steganography—has become an essential component of
unauthorized exchange, or deletion of sensitive information. modern cybersecurity strategies.
The transfer of confidential data via unsecured internet
channels presents significant challenges in protecting this Steganalysis seeks to uncover hidden information by
information. Hackers often seek to break cryptographic analyzing the characteristics of digital files and identifying
protections to gain access to private data. Cryptography, by patterns or anomalies that indicate the presence of concealed
encoding information into ciphertext, makes it unreadable to data. Various tools and techniques have been developed to
unauthorized users, thus safeguarding sensitive data such as assist with this process, ranging from simple signature-based
credit card numbers, bank account details, and business detection methods to advanced statistical analysis. Despite
communications. This encrypted data can only be decrypted these advancements, detecting steganography remains a
with the appropriate key used during encryption [1], [2], [3], challenging task, particularly as cybercriminals continue to
[4], [5], [6], [7]. develop more sophisticated methods to embed data in ways
that evade detection.
Cryptographic methods can be classified into two main
types: symmetric key and asymmetric key approaches, both Given the rising threat posed by steganography in the
of which transform plaintext into ciphertext. Encryption is realm of cybersecurity, this paper aims to review existing
akin to using a secret language that only the sender and steganalysis tools and explore their effectiveness when
recipient can understand, ensuring privacy even if the combined with real-time antivirus solutions. The integration
message is intercepted (see Fig.1). In symmetric key of steganalysis and antivirus tools could significantly
cryptography, the same key is used for both encryption and improve an organization's ability to detect and respond to
decryption, while in asymmetric cryptography, different keys hidden threats, providing a more comprehensive approach to
are used—one for encryption (public key) and another for data confidentiality. Additionally, the paper presents a proof-
decryption (private key). Although both methods provide of-concept demonstration of one of the steganalysis tools in

IJISRT24SEP937 www.ijisrt.com 1908


Volume 9, Issue 9, September – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24SEP937

action, showcasing its capabilities in uncovering hidden data One of the most common cryptanalysis techniques
within digital media files. includes brute force attacks, where every possible key
combination is tested until the correct key is found. Other
The goal of this paper is to review existing methods, such as differential cryptanalysis or linear
steganography detection techniques, examine various cryptanalysis, focus on analyzing patterns in the ciphertext
steganalysis tools, and explore how these tools can be that can reveal information about the encryption process
integrated with real-time antivirus programs to enhance data [11].
confidentiality and security. Additionally, this paper presents
a proof-of-concept demonstration of one such steganalysis Mathematical and statistical tools are frequently used to
tool, showcasing its effectiveness in identifying hidden data carry out cryptanalysis. By understanding the structure and
within digital media. Through this study, we aim to characteristics of the cipher being used, cryptanalysts can
contribute to the growing field of cybersecurity by uncover subtle flaws or overlooked design weaknesses that
highlighting the importance of detecting steganography and make an algorithm vulnerable to attack. Advances in
offering solutions for strengthening organizational data quantum computing have posed a potential threat to
protection. traditional encryption algorithms, as quantum cryptanalysis
could break current standards like RSA and ECC much faster
A. Cryptography than classical computers [12].
Cryptography is the practice of securing data by
converting it into an unreadable format known as ciphertext. C. Steganography
This process ensures the confidentiality, integrity, and Steganography is a data-hiding technique that focuses
authenticity of sensitive information during transmission, on concealing the existence of information by embedding it
storage, or access. Cryptographic techniques are essential within other, typically innocuous, digital media files such as
for protecting communication over untrusted networks, like images, videos, audio files, and even text documents. Unlike
the internet, preventing unauthorized users from intercepting cryptography, which makes data unreadable but does not
or understanding the message. The two primary categories of conceal its existence, steganography hides the presence of the
cryptography are symmetric-key encryption, where a single data itself, making it more difficult for potential attackers to
key is used for both encryption and decryption, and detect that communication is taking place [13].
asymmetric-key encryption, which uses a pair of keys: a Steganography derives from the Greek words steganos
public key for encryption and a private key for decryption ("covered") and graphein ("writing"), which together mean
[8], [9] [10]. "concealed writing." The technique has a long history dating
back to ancient times. Early examples include hiding
Symmetric encryption methods, such as AES messages within wax tablets or shaving the head of a slave,
(Advanced Encryption Standard) and DES (Data Encryption tattooing a message on the scalp, and allowing the hair to
Standard), are efficient and widely used for encrypting large regrow, thereby concealing the message. The concept was
volumes of data. Asymmetric encryption algorithms, like formally documented by Johannes Trithemius in his 1499
RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve book Steganographia, which explored methods for hiding
Cryptography), are often employed for securing key secret messages [14][14], [15].
exchanges and digital signatures, ensuring both
confidentiality and integrity [10]. The effectiveness of steganography lies in its ability to
blend sensitive information with normal digital files without
Cryptography serves various purposes beyond just altering their outward appearance. For example, in image
securing communication. It plays a vital role in ensuring data steganography, data can be embedded in the least significant
authenticity through digital signatures and hashes, non- bits (LSB) of pixel values, which allows minor modifications
repudiation through public key infrastructure (PKI), and to the image without creating noticeable visual changes to the
secure storage through encrypted files and databases. human eye. This makes steganography ideal for use in covert
However, as encryption algorithms evolve, so too do the communications, especially over public and unsecured
methods that aim to break them, such as cryptanalysis [11]. networks [16]. Modern steganographic systems often embed
data in multimedia objects like images, audio, or video files,
B. Cryptanalysis which are frequently shared across the internet [17].
Cryptanalysis is the science of analyzing cryptographic Steganography can be classified into several categories based
algorithms and systems to discover weaknesses that can be on the type of cover medium used:
exploited. The ultimate goal of cryptanalysis is to decrypt the
ciphertext without having access to the secret key, thus  Image Steganography
gaining unauthorized access to the original message. This method hides secret data within digital images. It is
Cryptanalysis often involves both theoretical and practical one of the most popular forms of steganography due to the
approaches to finding vulnerabilities in encryption methods, abundance of image files shared online. The least significant
such as weak key generation, algorithmic flaws, or improper bit (LSB) technique is commonly used, embedding hidden
implementation. information in the lower bits of each pixel, which minimally
affects the overall appearance of the image.

IJISRT24SEP937 www.ijisrt.com 1909


Volume 9, Issue 9, September – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24SEP937

 Audio Steganography passwords within files or securely transmitting confidential


In this technique, secret data is embedded within audio data over insecure communication channels. It can also be
files. By slightly altering the frequency spectrum or the phase used for watermarking digital media, protecting intellectual
of an audio signal, hidden information can be encoded. property rights by embedding ownership information that is
Techniques like LSB, phase coding, spread spectrum, and invisible to users but detectable with specific tools [19].
echo hiding are used in audio steganography.
However, steganography also has its darker
 Video Steganography applications. Cybercriminals often use steganographic
Similar to image steganography, video steganography techniques to hide malicious code or covertly exfiltrate
involves hiding data in the individual frames of video files. sensitive data from compromised systems without detection.
The added advantage of video files is that they consist of Combined with encryption, steganography presents
multiple images (frames) and sound, providing larger data- significant challenges for cybersecurity systems, making
hiding capacity. Popular formats like MPEG, AVI, and MP4 detection efforts more complex. Despite this, advancements
are commonly used for embedding secret data in video in steganalysis have made it possible to detect hidden data
streams. and mitigate threats through specialized tools and
methodologies [20].
 Text Steganography
This method conceals data within text files. It is This paper aims to explore various steganography
considered the oldest form of steganography. Modern detection techniques and tools to uncover hidden messages
techniques involve hiding data by manipulating text within common digital files (text, multimedia, and
formatting, altering letter positions, or using linguistic documents). By leveraging advanced steganalysis methods, it
methods to embed information in the structure of the text. is possible to enhance the detection of hidden content,
ensuring that steganographic attacks can be neutralized
D. Practical Applications of Steganography before they compromise data security.
Steganography has a variety of legitimate applications
in securing sensitive information, such as storing encrypted

Fig. 1. Techniques of Steganography

IJISRT24SEP937 www.ijisrt.com 1910


Volume 9, Issue 9, September – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24SEP937

II. STEGANALYSIS TOOLS AND TECHNIQUES C. Universal Statistical Steganalysis


Universal statistical steganalysis refers to detection
Steganalysis refers to the process of detecting, methods that are adaptable and do not require prior
extracting, and manipulating hidden data within knowledge of the specific steganographic technique being
steganographic files. The field of steganalysis focuses on used. This makes it a powerful tool for detecting hidden
revealing the existence of covert messages embedded in messages regardless of the embedding method employed.
digital media. Unlike cryptography, where the encrypted Unlike signature-based steganalysis, which depends on
message is visible but unreadable, steganography hides the known patterns, universal statistical techniques analyze the
message entirely, making detection more challenging. underlying statistical properties of the file in question,
Steganalysis is therefore crucial for uncovering these hidden allowing them to detect steganography even when the
messages, particularly in cases where steganography is used method is unknown [8], [9], [11], [16], [17], [19], [20], [22],
for malicious purposes [19]. [24], [25].

Two primary types of steganalysis exist: signature- For instance, by analyzing the natural statistics of an
based and statistical-based techniques. The distinction lies image and comparing them with the altered statistics after
in the method used for detection: either by identifying data embedding, universal statistical methods can expose
specific signatures left by steganography tools or by hidden information. Such approaches are versatile and can be
analyzing statistical anomalies in the media. applied to various media types (e.g., images, audio, video),
making them a critical tool for steganalysis in general-
A. Signature Steganalysis purpose cybersecurity applications.[8], [9], [11], [16], [17],
Signature-based steganalysis detects hidden messages [19], [20], [22], [24], [25].
by identifying specific signatures or patterns introduced into
the digital media by steganographic algorithms. When data is III. STEGANOGRAPHY TOOLS AND
embedded within an image, audio, or video file, certain TECHNIQUES
steganography tools leave identifiable markers, such as
degradation of the file quality or repeated patterns at the end Steganography involves embedding secret information
of the file. These markers can be detected using signature- within seemingly harmless files. The goal is to prevent third
based steganalysis tools, making it possible to determine parties from realizing that any hidden data exists at all. A
whether steganography was employed. variety of techniques and tools have been developed to
achieve this, allowing users to hide data in images, audio
For instance, some tools may append a specific string of files, videos, and other digital formats.
characters to the end of a file when injecting hidden data.
These signature strings act as flags, enabling forensic A. Steganography Techniques
investigators to uncover hidden messages. By comparing Digital steganography conceals information by
known signatures from different steganographic methods embedding it within a carrier file, which could be an image,
with the target media, the detection process can be audio clip, video file, or even a simple text document. The
automated. Signature-based detection methods are efficient, cover file remains functional and retains its original
but they depend heavily on the availability of known appearance, making it difficult to detect without specialized
signatures and may be ineffective against steganographic analysis. Fig 3 provides an illustration of how digital
methods that leave no visible trace [19], [20] (see Fig.2). steganography works [12], [13], [14], [21], [23], [26], [27].

B. Statistical Steganalysis Popular techniques used in digital steganography


Statistical steganalysis is more sophisticated and include:
involves analyzing the statistical properties of a digital file to
detect hidden information. Rather than relying on specific  Least Significant Bit (LSB) Substitution
signatures, this method examines anomalies or irregularities This is one of the simplest and most widely used
in the file’s structure. For example, the Least Significant Bit methods. It works by replacing the least significant bits of
(LSB) substitution method alters the least significant bits of each byte in an image or audio file with bits from the hidden
pixel values in an image to store hidden data. This change message. Since the changes are so minor, they do not affect
may introduce subtle distortions in the statistical distribution the overall quality of the media.
of pixel values, which statistical steganalysis can detect [21].
 Transform Domain Techniques
Other statistical methods include analyzing the These methods hide data in the transformed coefficients
frequency of color changes, detecting the noise patterns in of a media file, such as the frequency domain of an image or
audio files, or examining the statistical distributions of video the discrete cosine transform (DCT) of a video. The hidden
frames. These techniques are highly effective at uncovering information is embedded in the less perceptible regions of the
steganographic content even when no obvious signatures are file, making detection more challenging.
present. However, they may require substantial
computational resources and expertise in mathematical
modeling to detect small statistical deviations introduced by
steganography [21], [22], [23], [24], [25], [26].

IJISRT24SEP937 www.ijisrt.com 1911


Volume 9, Issue 9, September – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24SEP937

 Spread Spectrum steganographic content, proving the effectiveness of our


In audio steganography, this method spreads the hidden combined approach.
data over a wide frequency range in the audio signal, making
it resistant to noise and compression techniques. Table 2. List of Steganography tools

 Statistical Methods
These methods hide data by manipulating the statistical
properties of the media file, such as changing the distribution
of pixel values in an image or altering the bitrates in an audio
file.

B. Steganography Tools
Several software tools have been developed to facilitate
the embedding of hidden data in various types of files. Table
I lists some of the most common steganography tools and the
file formats they support:

Table 1. Steganography Previous Tools

Fig. 4 illustrates the steganography detection workflow,


while Fig. 5 and Fig. 6 demonstrates how the tool analyzed
an image containing steganography created with the JPHIDE
tool.

Fig. 2. Signature Embedded to the End of the File

These tools offer users the ability to hide sensitive data


within digital media files, whether for legitimate purposes
such as secure data transmission or malicious purposes like
hiding malware. It is important to note that while these tools
make it easy to embed hidden messages, they also present
challenges for cybersecurity experts tasked with detecting
steganographic content in a digital forensic investigation.

IV. EXPERIMENT AND RESULTS ANALYSIS

We developed a Python-based tool designed to monitor


directory changes in real time. This tool leverages the
Python Watchdog library, which tracks file creation or
modification events within a specified directory. Whenever a
file is created or altered, the tool immediately notifies the
user.

For the experiment, we combined this Python tool with


a Docker image containing several steganography detection
tools. The focus was on JPG files, given the widespread use
of image steganography. Specifically, we employed the
Fig. 3. Technique of Digital Steganography Process
Stegovirtas tool to detect hidden data within these image
files. The results showed successful identification of

IJISRT24SEP937 www.ijisrt.com 1912


Volume 9, Issue 9, September – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24SEP937

Fig. 5. Example of Steganography for Images

Fig. 4. Schematic Diagram

V. CONCLUSION AND FUTURE WORK

Steganography, particularly when combined with


cryptography, is an effective means of secure
communication. Although the technique is not widely used,
its potential for cybercriminal activity is significant. This
paper reviews current steganographic methods and detection
tools, along with a practical experiment. However, further Fig. 6. Steg Detection
research is needed to enhance detection across various file
types. Future work could focus on integrating steganalysis REFERENCES
tools with antivirus software for real-time detection,
providing stronger data confidentiality. [1]. Z. Alsaed et al., “Role of Blockchain Technology in
Combating COVID-19 Crisis,” Appl. Sci., vol. 11, no.
ACKNOWLEDGMENT 24, p. 12063, Dec. 2021, doi: 10.3390/app112412063.
[2]. E. Daraghmi, Z. Qaroush, M. Hamdi, and O.
The authors would like to thank Palestine Technical Cheikhrouhou, “Forensic Operations for Recognizing
University – Kadoorie for their support. SQLite Content (FORC): An Automated Forensic Tool
for Efficient SQLite Evidence Extraction on Android
Devices,” Appl. Sci., vol. 13, no. 19, p. 10736, Sep.
2023, doi: 10.3390/app131910736.

IJISRT24SEP937 www.ijisrt.com 1913


Volume 9, Issue 9, September – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24SEP937

[3]. E. Y. Daraghmi, C. H. Hsiao, and S. M. Yuan, “A New [15]. E.-Y. Daraghmi and A. Hamoudi, “THE
Cloud Storage Support and Facebook Enabled Moodle DEVELOPMENT OF A BLOCKCHAIN-BASED
Module,” in 2014 7th International Conference on Ubi- SYSTEM FOR ELECTRONIC VOTING,” . Vol., no.
Media Computing and Workshops, Ulaanbaatar, 17.
Mongolia: IEEE, Jul. 2014, pp. 78–83. doi: 10.1109/u- [16]. Y. Castelan and B. Khodja, “MP3 Steganography
media.2014.12. Techniques,” in Proceedings of the 4th Annual ACM
[4]. E. Y. Daraghmi and Y. S. Ming, “Using graph theory to Conference on Research in Information Technology
re-verify the small world theory in an online social (RIIT 2015), 2015, pp. 51–54. doi:
network word,” in Proceedings of the 14th International 10.1145/2808062.2808074.
Conference on Information Integration and Web-based [17]. A. El-Sayed, G. Attiya, and A. Fkirin, “Steganography
Applications & Services, Bali Indonesia: ACM, Dec. Literature Survey, Classification and Comparative
2012, pp. 407–410. doi: 10.1145/2428736.2428811. Study,” Commun. Appl. Electron., vol. 5, no. 10, pp.
[5]. E. Daraghmi, C.-P. Zhang, and S.-M. Yuan, “Enhancing 13–22, 2016, doi: 10.5120/cae2016652384.
Saga Pattern for Distributed Transactions within a [18]. E. Daraghmi, “Augmented Reality Based Mobile App
Microservices Architecture,” Appl. Sci., vol. 12, no. 12, for a University Campus,” 2017, doi:
p. 6242, Jun. 2022, doi: 10.3390/app12126242. 10.13140/RG.2.2.36356.24962.
[6]. E.-Y. Daraghmi, M.-C. Wu, and S.-M. Yuan, “A [19]. K. Karampidis, E. Kavallieratou, and G. Papadourakis,
Multilayer Data Processing and Aggregating Fog-Based “A Review of Image Steganalysis Techniques for
Framework for Latency-Sensitive IoT Services,” Appl. Digital Forensics,” J. Inf. Secur. Appl., vol. 40, pp.
Sci., vol. 11, no. 4, p. 1374, Feb. 2021, doi: 217–235, 2018, doi: 10.1016/j.jisa.2018.04.005.
10.3390/app11041374. [20]. M. Kaur and G. Kaur, “Review of Various Steganalysis
[7]. Y. Salem and E. Daraghmi, “GDPR-BLOCKCHAIN Techniques,” Int. J. Comput. Appl., vol. 5, no. 2, pp.
COMPLIANCE FOR PERSONAL DATA,” J. Theor. 1744–1747, 2014.
Appl. Inf. Technol., vol. 99, no. 24, pp. 5867–5877, [21]. J. Makwana and S. G. Chudasama, “Dual
2021. Steganography: A New Hiding,” Int. J. Adv. Res.
[8]. Y. Kumar, R. Munjal, and H. Sharma, “Comparison of Electr. Electron. Instrum. Eng., vol. 5, no. 4, pp. 3184–
Symmetric and Asymmetric Cryptography with 3188, 2016, doi: 10.15662/IJAREEIE.2016.0504109.
Existing Vulnerabilities and Countermeasures,” [22]. P. Hayati, V. Potdar, and E. Chang, “A Survey of
IJCSMS Int. J. Comput. Sci. Manag. Stud., vol. 11, no. Steganographic and Steganalytic Tools for the Digital
03, pp. 2231–5268, 2011. Forensic Investigator,” in Proceedings of the Workshop
[9]. R. Gupta, “Information Hiding and Attacks: Review,” of Information Hiding and Digital Watermarking in
Int. J. Comput. Trends Technol., vol. 10, no. 1, pp. 21– Conjunction with IFIPTM, New Brunswick, Canada,
24, 2014, doi: 10.14445/22312803/ijcttv10p105. 2007.
[10]. E. Y. Daraghmi, C.-F. Lin, and S. M. Yuan, “Mobile [23]. Shawahniibrahim, “Directory-watcher.” 2020. [Online].
Phone Enabled Barcode Recognition for Preferences Available:
Monitoring,” in Advances in Computer Science and https://github.com/shawahniibrahim/Directory-watcher
Education Applications, vol. 202, M. Zhou and H. Tan, [24]. DominicBreuker, “Steganography Toolkit.” 2020.
Eds., in Communications in Computer and Information [Online]. Available:
Science, vol. 202. , Berlin, Heidelberg: Springer Berlin https://github.com/DominicBreuker/stego-toolkit
Heidelberg, 2011, pp. 297–302. doi: 10.1007/978-3- [25]. Bannsec, “StegoVeritas.” 2020. [Online]. Available:
642-22456-0_43. https://github.com/bannsec/stegoVeritas
[11]. T. W. Edgar and D. O. Manz, “Science and Cyber [26]. A. Latham, “Steganography.” 1999. [Online].
Security,” in Research Methods for Cyber Security, Available: http://linux01.gwdg.de/ alatham/stego.html
Elsevier, 2017, pp. 33–62. doi: 10.1016/b978-0-12- [27]. S. A. Laskar and K. Hemachandran, “A Review on
805349-2.00002-9. Image Steganalysis Techniques for Attacking
[12]. A. Salem, M. Sabbih, H. Al-tamimi, and A. Ahmed, Steganography,” Int. J. Eng. Res. Technol., vol. 3, no. 1,
“Secure Image Steganography Through Multilevel pp. 3400–3410, 2014.
Security,” Int. J. Comput. Sci. Inf. Secur., vol. 11, no. 1,
pp. 80–103, 2020.
[13]. Y. Zheng, F. Liu, X. Luo, and C. Yang, “A Method
Based on Feature Matching to Identify Steganography
Software,” in 2012 4th International Conference on
Multimedia and Security (MINES 2012), 2012, pp.
989–994. doi: 10.1109/MINES.2012.26.
[14]. Merriam-Webster, “Definition of steganography.” 2020.
[Online]. Available: https://www.merriam-
webster.com/dictionary/steganography

IJISRT24SEP937 www.ijisrt.com 1914

You might also like