Article Preview
Top1. Introduction
The most critical concern in information transmission is security; encrypted data typically offer protection but attracts the attention of unauthorized Internet observers and is a sort of passive information assault. On the internet, attackers may find many tools for extracting information, analyzing it, and launching active attacks on encrypted data. The above behavior is cypher text, which is visible to everyone on the transport, causing suspicion. After cryptography privacy protection(Laskar, 2012)(Malina, 2021), the next degree of security is steganography, in which information is encrypted and disguised behind innocuous data and conveyed to the targets, avoiding suspicion. Image, audio, video, text, and network protocols are all examples of benign data(Gurunath R. &., 2021)(Gurunath R. &., 2021).Watermarking technology, like Steganography, conceals data on a cover to safeguard the security of digital documents. Watermarking protects the copyright and ensures the secrecy of the document's details. The document type might be anything from an image to text(Singh, 2021)(Iwendi, 2020).
Steganography uses a concealed writing method instead of transforming data into an unreadable format for secret communication(Sherly, 2010). Only the transmitter and recipient have access to the hidden message. Steganography derives its name from the Greek words “steganos,” which means “covered,” and “graphia,” which means “writing.” Johannes Trithemius used that name for the first time between 1462 and 1516(Fridrich, 2009).
The earliest steganographic techniques were discovered roughly 2500 years ago in ancient Greece when people used to convey secret information by etching it on their shaved heads. When the hair on the head comes back, send that individual to the target to bring the confidential material. During the same period, another example of steganography was embedding the message on a wood surface covered with a wax-like substance to prevent suspicion from other persons during transport(Shin, 2008).
In his ascent to power in ancient India, Chanakya aided the first Mauryan emperor Chandragupta in 283 BC (2303-2395 years ago). He was recognized as a key figure in creating the Maurya Empire. Both Chandragupta and his son Bindusara had Chanakya as their principle counsel. Chanakya proposed a highly evolved and upgraded all-pervasive system of espionage and government. During that period, hidden messages were sent by embedding them in intricately designed puzzles or poems, later carried to the intended recipients(Sarin, 2015).
There are several instances of such early steganography, and a similar concept has been used today as digital data hiding. It is now an element of information technology, alongside cryptography. Concealing, hiding, camouflaging, and embedding data on a text, image, audio, video, and using network protocol are all terms used to describe the modern-day digital steganography process.
Figure 1. A typical classical steganography
The digital steganography process consists of two sub-processes: embedding and extraction (Figure 1), carried out by the transmitter and receiver, respectively. The process's fundamental purpose is to deliver the message to the intended recipient safely. The message is encoded inside an innocent cover object to avoid detection by third parties, and only the parties involved are aware of how to embed and extract the message. Stego-text results from embedding are comparable to a cover object holding a message and are subsequently sent to the receiver through the Internet (Insecure Channel). The receiver understands how to decode the message from the Stego-object. If a third party suspects the communication, an optional Stego-key can be employed to safeguard it. Stego-key produced by one of the communication parties using any known method and sent to the other communicating party through a secure channel. However, third-party communication attacks on the Internet cannot be ruled out. They are continually attempting to disrupt the steganography process, known as steganalysis.