INFORMATION SECURITY

Possibilities for using steganography methods in the quantum century

  • 1 National Military University, Faculty of Artillery, AAD and KIS, Shumen, Bulgaria,

Abstract

Security of confidential information has always been an important issue. The aim of this work is to present and discuss the main themes at a new level in steganography methods nowadays. This review paper introduces a comprehensive survey related to nowadays embedding techniques. Steganography is often used with cryptography so that the information is doubly protected, but the combination of these techniques ensures that even if the steganographic method is discovered, the encrypted data remains secure and unreadable without the proper decryption key. This dual-layered approach significantly enhances the overall security of the hidden information.

Keywords

References

  1. Rabiner, L., Juang, B., An introduction to hidden Markov models., IEEE ASSp magazine, 1986;3(1):4-16.
  2. Johri,P., Mishra, A., Kumar,A., Survey on steganography methods (text, image, audio, video, protocol and network steganography, International Conference on Computing for Sustainable Global Development, (2016).
  3. Hu, Y., Li, H., Song, J., Huang, Y. (2020). MM-Stega: Multi-modal Steganography Based on Text-Image Matching. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Communications in Computer and Information Science, vol 1254. Springer, Singapore. ttps://doi.org/10.1007/978- 981-15-8101-4_29 .
  4. Hu, Y., Yang, Z., Cao, H., Huang, Y. (2021). Multi-modal Steganography Based on Semantic Relevancy. In: Zhao, X., Shi, YQ., Piva, A., Kim, H.J. (eds) Digital Forensics and Watermarking. IWDW 2020. Lecture Notes in Computer Science(), vol 12617. Springer, Cham. https://doi.org/10.1007/978-3-030-69449-4_.
  5. Tasheva,A., Tasheva, Zh. & Nakov,P. Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching. In Proceedings of the 18th International Conference on Computer Systems and Technologies (CompSysTech'17), Boris Rachev and Angel Smrikarov (Eds.). ACM, New York, NY, USA, 233-240. DOI: https://doi.org/10.1145/3134302.3134325.
  6. Kumar, P.M. & Shanmuganathan, K. L., Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate‖, Journal of Telecommunications and Information Technology, 2/2011.
  7. Stoyanova, V. Research of the characteristics of a steganography algorithm in images when using different alphabet. In: ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference. 2024. p. 255-259.
  8. Wazirali, R., Chaczko, Z., Carrion, L. (2015). Bio-informatics with Genetic Steganography Technique. In: Borowik, G., Chaczko, Z., Jacak, W., Łuba, T. (eds) Computational Intelligence and Efficiency in Engineering Systems. Studies in Computational Intelligence, vol 595. Springer, Cham. https://doi.org/10.1007/978- 3-319-15720-7_24.
  9. Nosrati Masoud ,Ali Hanani, Karimi Ronak ―Steganography in Image Segments using Genetic Algorithm‖ IEEE Fifth International Conference on Advanced Computing & Communication Technologies pages 102-107, Feb 2015.
  10. Hussain, M., A. W. A. Wahab, Y. I. B. Idris, A. T. Ho and K. H. Jung. ―Image steganography in spatial domain: A survey,‖ Signal Processing: Image Communication, vol. 65, pp. 46– 66, 2018, https://doi.org/10.1016/j.image.2018.03.012.
  11. Baluja, Sh., Hiding images in plain sight: Deep steganography. Advances in neural information processing systems, 2017, 30.
  12. Zhu,J., Kaplan,R. Johnson,J., and Fei-Fei, L. , Hidden: Hiding data with deep networks,‖ in Proc. of the European Conf. on Computer Vision ECCVMunich, Germany, 2018, pp. 657–672
  13. Shang,Y., Jiang,S., Ye,D., and Huang, J., Enhancing the security of deep learning steganography via adversarial examples, Mathematics, 2020, vol. 8, no. 9, pp. 1–10.
  14. Chuang, I., Nielsen, M., Quantum Computation and Quantum Information, Cambridge University Press, ed. 1, 2000.
  15. Min-Allah N, Nagy N, Aljabri M, Alkharraa M, Alqahtani M, Alghamdi D, Sabri R, Alshaikh R. Quantum Image Steganography Schemes for Data Hiding: A Survey. Applied Sciences. 2022; 12(20):10294. https://doi.org/10.3390/app122010294
  16. Dimitrov, D., Kirov, M., Методи за повишаване на достоверността на информацията при опознаване в системите за идентификация, Научна сесия НВУ ―В. Левски‖, факултет ―А, ПВО и КИС, Шумен, Сборник научни трудове, стр. 153- 158, Шумен, 2010г ISSN: 1313-7433
  17. Chowdhuri, P., Pal, P. & Si, T. A novel steganographic technique for medical image using SVM and IWT. Multimed Tools Appl 82, 20497–20516 (2023). https://doi.org/10.1007/s11042-022- 14301-0.
  18. Rao K. R., and P. C. Yip. „The Transform and Data Compression Handbook―, 1st ed.: CRC Press, 2001.
  19. Georges, J., Magdi, D.A. (2020). Using Artificial Intelligence Approaches for Image Steganography: A Review. In: Ghalwash, A., El Khameesy, N., Magdi, D., Joshi, A. (eds) Internet of Things— Applications and Future. Lecture Notes in Networks and Systems, vol 114. Springer, Singapore. https://doi.org/10.1007/978-981-15- 3075-3_16

Article full text

Download PDF