Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

  • PDF / 2,288,898 Bytes
  • 49 Pages / 439.37 x 666.142 pts Page_size
  • 66 Downloads / 201 Views

DOWNLOAD

REPORT


Steganography and Steganalysis (in digital forensics): a Cybersecurity guide Mukesh Dalal 1

& Mamta Juneja

1

Received: 9 March 2020 / Revised: 19 August 2020 / Accepted: 17 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis. Keywords Cybersecurity . Digital forensics . Steganography . Steganalysis . Tools

* Mukesh Dalal [email protected] Mamta Juneja [email protected]

1

UIET, Panjab University, Chandigarh, India

Multimedia Tools and Applications

1 Introduction Secure communication is the basic need of the present digital world owing to the gigantic evolution in digital communication. Steganography is an art of covert communication in which information is concealed into a cover object. With the advent of the computer system, new opportunities and venues for concealing secret data have been evolved nowadays [174]. Today, steganography is now accessible and well in reach for the common people for covert communication using their own systems or even mobile phones with an internet connection. In addition to steganography, there are other techniques for secure communication such as cryptography and watermarking. However, steganography has an advantage over cryptography and watermarking, i.e. the steganography media after embedding appears to be same as the cover media (in which data is hidden). The collective usage of cryptography and steganography can efficiently develop a technique of covert communication. Watermarking is another field of information security which is intended to focus on copyright protection and infringements. The data hiding in watermarking can be done in