Análisis de técnicas de esteganografía aplicadas en archivos de audio e imagen
Resumen
El presente trabajo realiza un análisis descriptivo de las principales técnicas de esteganografía utilizadas en medios digitales específicos como los archivos de audio e imagen. Para esto se efectúo una revisión literaria de dominios, métodos y técnicas que son parte de este conjunto, identificando su funcionamiento, cualidades y debilidades. Se concluye que existe una amplia relación entre las técnicas de esteganografía de audio e imagen en su forma de implementación, se determina que LSB es una de las técnicas más débiles, y también se presentan cuáles son las técnicas más seguras y robustas dentro de cada tipo de medio.
Palabras clave
Texto completo:
PDFReferencias
Amirtharajan, R., & Rayappan, J. B. (2013). Steganography—Time to Time: A Review. Research Journal of Information Technology, 5(2), 58-66.
Antony, J., Sobin, C. C., & Sherly, a. P. (2012). Audio Steganography in Wavelet Domain A Survey. International Journal of Computer Applications, 52(13), 33–37. http://doi.org/10.5120/8265-1810
Bairagi, A. K., Mondal, S., & Debnath, R. (2014, March). A robust RGB channel based image steganography technique using a secret key. In Computer and Information Technology (ICCIT), 2013 16th International Conference on (pp. 81-87). IEEE
Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., & Sanyal, G. (2011, December). Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography. In Information and Communication Technologies (WICT), 2011 World Congress on (pp. 36-41). IEEE.
Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2013). Hiding & Analyzing Data in Image Using Extended PMM. In International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) (Vol. 10, pp. 157–166). http://doi.org/10.1016/j.protcy.2013.12.348
Cvejic, N., & Seppänen, T. (2002). A wavelet domain LSB insertion algorithm for high capacity audio steganography. Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, DSP 2002 and 2nd Signal Processing Education Workshop, SPE 2002, 53–55. http://doi.org/10.1109/DSPWS.2002.1231075
Chandran, S., & Bhattacharyya, K. (2015, January). Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography. In Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on (pp. 1-5). IEEE.
Dutta, P., Bhattacharyya, D., & Kim, T. (2009). Data Hiding in Audio Signal : A Review. International Journal of Database Theory and Application, 2(2), 1–8.
Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing, 2012(1), 1-16.
Dixit, P. H., Waskar, K. B., & Bombale, U. L. (2015). Multilevel Network Security Combining Cryptography and Steganography on ARM Platform, 3(1), 11–15. Recuperado de http://doi.org/10.12691/jes-3-1-2
Esteganografía. 2017. EcuRed. Recuperado de https://www.ecured.cu/Esteganograf%C3%ADa
Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications. Cambridge University Press.
Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence, 2(1), 56–64. http://doi.org/10.4304/jetwi.2.1.56-64
Giallorenzi, T., Lake, M., Kingston, S, & Harris, J (2010). U.S. Patent No. US 7,643,537 B1. Washington, DC: U.S. Patent and Trademark Office.
Hussain, M., & Hussain, M. (2013). A survey of image steganography. International Journal of Advanced Science and Technology, 54, 1–13.
Hamid, N., Yahya, A., Ahmad, R., & Al-Qershi, O. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187
Jenkins, N., & Martina, J. E. (2009). Steganography in Audio. Anais Do IX Simpósio Brasileiro Em Segurança Da Informação E de Sistemas Computacionais, 269–278.
Kaur, S., Bansal, S., & Bansal, R. K. (2014). Steganography and classification of image steganography techniques. In 2014 International Conference on Computing for Sustainable Global Development, INDIACom 2014 (pp. 870–875). New Delhi: IEEE. Recuperado de http://doi.org/10.1109/IndiaCom.2014.6828087
Kruus, P., Scace, C., Heyman, M., & Mundy, M. (2003). A survey of steganography techniques for image files. Advanced Security Research Journal. [On line], 5(1), 41-52.
Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., & Pevný, T. (2013), Junio). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the first ACM workshop on Information hiding and multimedia security (pp. 45-58). ACM.
Krenn, R. (2004, Enero). Steganography andSteganalysis. Recuperado de http://www.krenn.nl/univ/cry/steg/article.pdf
Malhotra, N., & Tahilramani, N. (2014). Survey on Speech and Audio Steganography Techniques in Temporal, Transform and Coded Domains. International Journal of Advanced Research in Computer Science and Software Engineering, 4(3), 800–809
Malik, H. M. A., Ansari, R., & Khokhar, A. A. (2007). Robust data hiding in audio using allpass filters. IEEE Transactions on Audio, Speech and Language Processing, 15(4), 1296–1304. http://doi.org/10.1109/TASL.2007.894509
Morkel, T., Eloff, J. H. P., & Olivier, M. S. (2005). An Overview of Image Steganography. In Proceedings of the ISSA 2005 New Knowledge Today Conference (Vol. 83, pp. 51–107). South Africa.
Olanrewaju, R. F., Khalifa, O., & Rahman, H. (2013). Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal, 21(SPECIAL ISSUE1), 79–83. ttp://doi.org/10.5829/idosi.wasj.2013.21.mae.99926
Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security and Privacy, 1(3), 32–44. http://doi.org/10.1109/MSECP.2003.120322
Swain, G., & Lenka, S. K. (2014). Classification of Image Steganography Techniques in Spatial Domain : A Study. International Journal of Computer Science & Engineering Technology, 5(03), 219–232.
Singla, D., & Juneja, M. (2014, March). An analysis of edge based image steganography techniques in spatial domain. In Engineering and Computational Sciences (RAECS), 2014 Recent Advances in (pp. 1-5). IEEE
Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security, 48, 131-141.
Soni, A., Jain, J., & Roshan, R. (2013). Image steganography using discrete fractional Fourier transform. In 2013 International Conference on Intelligent Systems and Signal Processing (ISSP) (pp. 97–100). Gujarat: IEEE. http://doi.org/10.1109/ISSP.2013.6526882
Wang, H., & Shuozhong, W. (2004). Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM, 47(10), 76–82.
Wu, D, & Tsai, W. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9), 1613-1626.
Walia, E., Jain, P., & Navdeep, N. (2010). An analysis of LSB & DCT based steganography. Global Journal of Computer Science and Technology, 10(1).
Zielinska, E., Mazurczyk, W., & Szczypiorski, K. (2014). Trends in Steganography. Communications of the ACM, 57, 86–96.
DOI: https://doi.org/10.23857/pc.v2i1.10
Enlaces de Referencia
- Por el momento, no existen enlaces de referencia
Polo del Conocimiento
Revista Científico-Académica Multidisciplinaria
ISSN: 2550-682X
Casa Editora del Polo
Manta - Ecuador
Dirección: Ciudadela El Palmar, II Etapa, Manta - Manabí - Ecuador.
Código Postal: 130801
Teléfonos: 056051775/0991871420
Email: polodelconocimientorevista@gmail.com / director@polodelconocimiento.com
URL: https://www.polodelconocimiento.com/