Análisis de técnicas de esteganografía aplicadas en archivos de audio e imagen

Gabriela Maholy Velásquez-Moreira, Lizandro Antonio Molina-Sabando, Ítalo Bécquer Briones-Véliz

Resumen


El presente trabajo realiza un análisis descriptivo de las principales técnicas de esteganografía utilizadas en medios digitales específicos como los archivos de audio e imagen. Para esto se efectúo una revisión literaria de dominios, métodos y técnicas que son parte de este conjunto, identificando su funcionamiento, cualidades y debilidades. Se concluye que existe una amplia relación entre las técnicas de esteganografía de audio e imagen en su forma de implementación, se determina que LSB es una de las técnicas más débiles, y también se presentan cuáles son las técnicas más seguras y robustas dentro de cada tipo de medio.


Palabras clave


Audio; esteganografía; imagen.

Texto completo:

PDF

Referencias


Amirtharajan, R., & Rayappan, J. B. (2013). Steganography—Time to Time: A Review. Research Journal of Information Technology, 5(2), 58-66.

Antony, J., Sobin, C. C., & Sherly, a. P. (2012). Audio Steganography in Wavelet Domain A Survey. International Journal of Computer Applications, 52(13), 33–37. http://doi.org/10.5120/8265-1810

Bairagi, A. K., Mondal, S., & Debnath, R. (2014, March). A robust RGB channel based image steganography technique using a secret key. In Computer and Information Technology (ICCIT), 2013 16th International Conference on (pp. 81-87). IEEE

Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., & Sanyal, G. (2011, December). Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography. In Information and Communication Technologies (WICT), 2011 World Congress on (pp. 36-41). IEEE.

Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2013). Hiding & Analyzing Data in Image Using Extended PMM. In International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) (Vol. 10, pp. 157–166). http://doi.org/10.1016/j.protcy.2013.12.348

Cvejic, N., & Seppänen, T. (2002). A wavelet domain LSB insertion algorithm for high capacity audio steganography. Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, DSP 2002 and 2nd Signal Processing Education Workshop, SPE 2002, 53–55. http://doi.org/10.1109/DSPWS.2002.1231075

Chandran, S., & Bhattacharyya, K. (2015, January). Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography. In Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on (pp. 1-5). IEEE.

Dutta, P., Bhattacharyya, D., & Kim, T. (2009). Data Hiding in Audio Signal : A Review. International Journal of Database Theory and Application, 2(2), 1–8.

Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing, 2012(1), 1-16.

Dixit, P. H., Waskar, K. B., & Bombale, U. L. (2015). Multilevel Network Security Combining Cryptography and Steganography on ARM Platform, 3(1), 11–15. Recuperado de http://doi.org/10.12691/jes-3-1-2

Esteganografía. 2017. EcuRed. Recuperado de https://www.ecured.cu/Esteganograf%C3%ADa

Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications. Cambridge University Press.

Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence, 2(1), 56–64. http://doi.org/10.4304/jetwi.2.1.56-64

Giallorenzi, T., Lake, M., Kingston, S, & Harris, J (2010). U.S. Patent No. US 7,643,537 B1. Washington, DC: U.S. Patent and Trademark Office.

Hussain, M., & Hussain, M. (2013). A survey of image steganography. International Journal of Advanced Science and Technology, 54, 1–13.

Hamid, N., Yahya, A., Ahmad, R., & Al-Qershi, O. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187

Jenkins, N., & Martina, J. E. (2009). Steganography in Audio. Anais Do IX Simpósio Brasileiro Em Segurança Da Informação E de Sistemas Computacionais, 269–278.

Kaur, S., Bansal, S., & Bansal, R. K. (2014). Steganography and classification of image steganography techniques. In 2014 International Conference on Computing for Sustainable Global Development, INDIACom 2014 (pp. 870–875). New Delhi: IEEE. Recuperado de http://doi.org/10.1109/IndiaCom.2014.6828087

Kruus, P., Scace, C., Heyman, M., & Mundy, M. (2003). A survey of steganography techniques for image files. Advanced Security Research Journal. [On line], 5(1), 41-52.

Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., & Pevný, T. (2013), Junio). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the first ACM workshop on Information hiding and multimedia security (pp. 45-58). ACM.

Krenn, R. (2004, Enero). Steganography andSteganalysis. Recuperado de http://www.krenn.nl/univ/cry/steg/article.pdf

Malhotra, N., & Tahilramani, N. (2014). Survey on Speech and Audio Steganography Techniques in Temporal, Transform and Coded Domains. International Journal of Advanced Research in Computer Science and Software Engineering, 4(3), 800–809

Malik, H. M. A., Ansari, R., & Khokhar, A. A. (2007). Robust data hiding in audio using allpass filters. IEEE Transactions on Audio, Speech and Language Processing, 15(4), 1296–1304. http://doi.org/10.1109/TASL.2007.894509

Morkel, T., Eloff, J. H. P., & Olivier, M. S. (2005). An Overview of Image Steganography. In Proceedings of the ISSA 2005 New Knowledge Today Conference (Vol. 83, pp. 51–107). South Africa.

Olanrewaju, R. F., Khalifa, O., & Rahman, H. (2013). Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal, 21(SPECIAL ISSUE1), 79–83. ttp://doi.org/10.5829/idosi.wasj.2013.21.mae.99926

Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security and Privacy, 1(3), 32–44. http://doi.org/10.1109/MSECP.2003.120322

Swain, G., & Lenka, S. K. (2014). Classification of Image Steganography Techniques in Spatial Domain : A Study. International Journal of Computer Science & Engineering Technology, 5(03), 219–232.

Singla, D., & Juneja, M. (2014, March). An analysis of edge based image steganography techniques in spatial domain. In Engineering and Computational Sciences (RAECS), 2014 Recent Advances in (pp. 1-5). IEEE

Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security, 48, 131-141.

Soni, A., Jain, J., & Roshan, R. (2013). Image steganography using discrete fractional Fourier transform. In 2013 International Conference on Intelligent Systems and Signal Processing (ISSP) (pp. 97–100). Gujarat: IEEE. http://doi.org/10.1109/ISSP.2013.6526882

Wang, H., & Shuozhong, W. (2004). Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM, 47(10), 76–82.

Wu, D, & Tsai, W. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9), 1613-1626.

Walia, E., Jain, P., & Navdeep, N. (2010). An analysis of LSB & DCT based steganography. Global Journal of Computer Science and Technology, 10(1).

Zielinska, E., Mazurczyk, W., & Szczypiorski, K. (2014). Trends in Steganography. Communications of the ACM, 57, 86–96.




DOI: https://doi.org/10.23857/pc.v2i1.10

Enlaces de Referencia

  • Por el momento, no existen enlaces de referencia
';





Polo del Conocimiento              

Revista Científico-Académica Multidisciplinaria

ISSN: 2550-682X

Casa Editora del Polo                                                 

Manta - Ecuador       

Dirección: Ciudadela El Palmar, II Etapa,  Manta - Manabí - Ecuador.

Código Postal: 130801

Teléfonos: 056051775/0991871420

Email: polodelconocimientorevista@gmail.com / director@polodelconocimiento.com

URL: https://www.polodelconocimiento.com/