BibTex RIS Cite

An Investigation on Information Hiding Tools for Steganography

Year 2014, Volume: 3 Issue: 3, 200 - 208, 28.09.2014

Abstract

In this paper, information about steganographic methods and tools which are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as achievement on data hiding, used methods, types of hidden data and cover media are examined.

References

  • C. Ming, Z. Ru, N. Xin xin and Y. Yixian, “Analysis of current steganography tools: classifications & features”, International Conference on Intelligent Information Hid ing and Multimedia Signal Processing, 2006. Analyzing steganography softwares, URL: http://www.guillermito2.net/stegano/, Last accessed: July
  • N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digita l Watermarking, Artech House, Inc., Norwood, 2000.
  • E. M ichaud, “Current steganography tools and methods”, SANS Penetration Testing, April 2003.
  • A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Dig ital image steganography: survey and analysis of current methods”, Signal Processing, 2010, pp. 727-752, doi:10.1016/ j.sigpro.2009.08.010.
  • R. Zax and F. Adelstein, “FAUST: Forensic artifacts of uninstalled steganography tools”, Digital Investigation, , pp. 25-38, doi:10.1016/ j.diin.2009.02.002.
  • B. Dunbar, “A detailed look at steganographic techniques and their use in an open-systems environment”, SANS Institute Reading Room, 2002.
  • P. Hayati, V. Potdar and E. Chang, "A survey of steganographic and steganalytic tools for the digital forensic investigator", In Workshop of Informat ion Hid ing and Digital Watermarking, 2007.
  • H. Mathkour, B. Al-Sadoon and A. Touir, "A new image steganography technique", Wireless Co mmunications, Networking and Mobile Co mputing, 2008. WiCOM '0 8. th International Conference, pp.I-4, 12-14 Oct. 2008. Steganography http://www.jjtc.com/ Steganography/tools.html, accessed: May 2013. software, URL: Last Steganography, Wikipedia, URL: http://en.wikipedia.org/wiki/Steganography, Last accessed: June 2013
  • D. Kahn, The Codebreake rs, Ne w York, NY: The Macmillan Company, 1967. p. 67.
  • X. Li, B. Yang, D. Cheng and T. Zeng, “A generalization of LSB matching”, IEEE Signal Processing Letters, Vo l. , No. 2, pp. 69-72, February 2009.
  • S. Clark and C. Chang , “Linguistic steganography: information hiding in text”, URL: http://www.c l.ca m.ac.uk/~sc609/talks/ed12stego.pdf, Last accessed: June 2013.
  • P. Singh, R. Chaudhary and A. Agarwal, “A novel approach of text steganography based on null spaces”, IOSR Journal of Co mputer Engineering, Vol. 3, Issue 4, pp. 11-17, July-Aug. 2012.
  • E. Satir and H. Isik, “A co mpression-based text steganography method”, The Journal of Systems and Software, 1016/j.jss.2012.05.027. pp. 2394, doi:
  • I. Nechta and A. Fionov, “Applying statistical methods to text steganography”, arXiv :1110.2654v 1 [cs.CR] 12 Oct
  • A.F. Al-Aza wi and M. A. Fadhil, “Arabic te xt steganography using Kashida extensions with Huffman code”, Journal of Applied Sciences 10(5), pp. 436-439, A.A. Gutub, L.M. Ghouti, Y.S. Ela rian, S.M. A waideh and A.K. Alvi, “Utilizing diacritic marks for Arabic text steganography”, Kuwait Journal of Sc ience & Engineering (KJSE), Vol. 37, No. 1, June 2010.
  • R. Zad jmool, “Hidden threat: Alternate Data Streams”, , URL: http://www.windowsecurity.com/art ic les - tutorials/windows_os_security/Alternate_Data_Streams.ht ml, Last accessed: June 2013.
  • M. Garg, “A novel text steganography technique based on HTM L documents”, International Journal of Advanced Science and Technology, Vol. 35, Oct. 2011, pp. 129-138.
  • I. Karadogan, R. Das, M. Baykara, “Scapy ile ağ paket man ipülasyonu” (in Turkish), 1st International Sy mposium on Digita l Forensics and Security, pp. 196-201, 20-21 May K. Ahsan, “Covert channel analysis and data hiding in TCP/IP”, M.A.Sc. thesis, Dept. of Electrical and Co mputer Engineering, University of Toronto, 2002. OpenPuff Website, URL: http://embeddedsw.net/OpenPuff_Steganography_Home.h tml, Last accessed: June 2013.
  • OpenStego Website, URL: http://www.openstego.info/, Last accessed: June 2013. Steganography Studio Website, URL: http://stegstudio.sourceforge.net/, Last accessed: June Virtual
  • Steganographic Laboratory Website, URL: http://vsl.sourceforge.net/, Last accessed: May 2013. SteganPEG Website, URL: http://www.abhira m.t k/home/steganojpeg, Last accessed: June 2013.
  • SilentEye Website, URL: http://www.silenteye.org/, Last accessed: June 2013. F5-Steganography Website, URL: Last http://code.google.com/p/f5-steganography/, accessed: June 2013.
  • Out Guess Website, URL: http://www.outguess.org/, Last accessed: May 2013.
  • Steghide Website, URL: http://steghide.sourceforge.net/, Last accessed: June 2013.
  • D. Upham, “JSteg Steganographic Algorith m”, URL: http://zooid.org/~paul/crypto/jsteg/, Last accessed: July Steg Website, URL: https://steg.drupalgardens.com/, Last accessed: June 2013.
  • Cipher Image Website, “Software for Photographers”, URL: http://www.realityinreflections.com/cipherimage.ht m, Last accessed: June 2013.
  • M. Bay kara, R. Daş, "A Steganography Application for Secure Conference on Electronics, Co mputer and Co mputation (ICECCO 2013), Turgut Özal University, pp.309-313, 7-9 November 2013, Ankara. Website, URL: Data Co mmun ication", th International
Year 2014, Volume: 3 Issue: 3, 200 - 208, 28.09.2014

Abstract

References

  • C. Ming, Z. Ru, N. Xin xin and Y. Yixian, “Analysis of current steganography tools: classifications & features”, International Conference on Intelligent Information Hid ing and Multimedia Signal Processing, 2006. Analyzing steganography softwares, URL: http://www.guillermito2.net/stegano/, Last accessed: July
  • N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digita l Watermarking, Artech House, Inc., Norwood, 2000.
  • E. M ichaud, “Current steganography tools and methods”, SANS Penetration Testing, April 2003.
  • A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Dig ital image steganography: survey and analysis of current methods”, Signal Processing, 2010, pp. 727-752, doi:10.1016/ j.sigpro.2009.08.010.
  • R. Zax and F. Adelstein, “FAUST: Forensic artifacts of uninstalled steganography tools”, Digital Investigation, , pp. 25-38, doi:10.1016/ j.diin.2009.02.002.
  • B. Dunbar, “A detailed look at steganographic techniques and their use in an open-systems environment”, SANS Institute Reading Room, 2002.
  • P. Hayati, V. Potdar and E. Chang, "A survey of steganographic and steganalytic tools for the digital forensic investigator", In Workshop of Informat ion Hid ing and Digital Watermarking, 2007.
  • H. Mathkour, B. Al-Sadoon and A. Touir, "A new image steganography technique", Wireless Co mmunications, Networking and Mobile Co mputing, 2008. WiCOM '0 8. th International Conference, pp.I-4, 12-14 Oct. 2008. Steganography http://www.jjtc.com/ Steganography/tools.html, accessed: May 2013. software, URL: Last Steganography, Wikipedia, URL: http://en.wikipedia.org/wiki/Steganography, Last accessed: June 2013
  • D. Kahn, The Codebreake rs, Ne w York, NY: The Macmillan Company, 1967. p. 67.
  • X. Li, B. Yang, D. Cheng and T. Zeng, “A generalization of LSB matching”, IEEE Signal Processing Letters, Vo l. , No. 2, pp. 69-72, February 2009.
  • S. Clark and C. Chang , “Linguistic steganography: information hiding in text”, URL: http://www.c l.ca m.ac.uk/~sc609/talks/ed12stego.pdf, Last accessed: June 2013.
  • P. Singh, R. Chaudhary and A. Agarwal, “A novel approach of text steganography based on null spaces”, IOSR Journal of Co mputer Engineering, Vol. 3, Issue 4, pp. 11-17, July-Aug. 2012.
  • E. Satir and H. Isik, “A co mpression-based text steganography method”, The Journal of Systems and Software, 1016/j.jss.2012.05.027. pp. 2394, doi:
  • I. Nechta and A. Fionov, “Applying statistical methods to text steganography”, arXiv :1110.2654v 1 [cs.CR] 12 Oct
  • A.F. Al-Aza wi and M. A. Fadhil, “Arabic te xt steganography using Kashida extensions with Huffman code”, Journal of Applied Sciences 10(5), pp. 436-439, A.A. Gutub, L.M. Ghouti, Y.S. Ela rian, S.M. A waideh and A.K. Alvi, “Utilizing diacritic marks for Arabic text steganography”, Kuwait Journal of Sc ience & Engineering (KJSE), Vol. 37, No. 1, June 2010.
  • R. Zad jmool, “Hidden threat: Alternate Data Streams”, , URL: http://www.windowsecurity.com/art ic les - tutorials/windows_os_security/Alternate_Data_Streams.ht ml, Last accessed: June 2013.
  • M. Garg, “A novel text steganography technique based on HTM L documents”, International Journal of Advanced Science and Technology, Vol. 35, Oct. 2011, pp. 129-138.
  • I. Karadogan, R. Das, M. Baykara, “Scapy ile ağ paket man ipülasyonu” (in Turkish), 1st International Sy mposium on Digita l Forensics and Security, pp. 196-201, 20-21 May K. Ahsan, “Covert channel analysis and data hiding in TCP/IP”, M.A.Sc. thesis, Dept. of Electrical and Co mputer Engineering, University of Toronto, 2002. OpenPuff Website, URL: http://embeddedsw.net/OpenPuff_Steganography_Home.h tml, Last accessed: June 2013.
  • OpenStego Website, URL: http://www.openstego.info/, Last accessed: June 2013. Steganography Studio Website, URL: http://stegstudio.sourceforge.net/, Last accessed: June Virtual
  • Steganographic Laboratory Website, URL: http://vsl.sourceforge.net/, Last accessed: May 2013. SteganPEG Website, URL: http://www.abhira m.t k/home/steganojpeg, Last accessed: June 2013.
  • SilentEye Website, URL: http://www.silenteye.org/, Last accessed: June 2013. F5-Steganography Website, URL: Last http://code.google.com/p/f5-steganography/, accessed: June 2013.
  • Out Guess Website, URL: http://www.outguess.org/, Last accessed: May 2013.
  • Steghide Website, URL: http://steghide.sourceforge.net/, Last accessed: June 2013.
  • D. Upham, “JSteg Steganographic Algorith m”, URL: http://zooid.org/~paul/crypto/jsteg/, Last accessed: July Steg Website, URL: https://steg.drupalgardens.com/, Last accessed: June 2013.
  • Cipher Image Website, “Software for Photographers”, URL: http://www.realityinreflections.com/cipherimage.ht m, Last accessed: June 2013.
  • M. Bay kara, R. Daş, "A Steganography Application for Secure Conference on Electronics, Co mputer and Co mputation (ICECCO 2013), Turgut Özal University, pp.309-313, 7-9 November 2013, Ankara. Website, URL: Data Co mmun ication", th International
There are 26 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Resul Das

Publication Date September 28, 2014
Submission Date January 30, 2016
Published in Issue Year 2014 Volume: 3 Issue: 3

Cite

IEEE R. Das, “An Investigation on Information Hiding Tools for Steganography”, IJISS, vol. 3, no. 3, pp. 200–208, 2014.