Article Preview
Top1. Introduction
Exchanging data now-a-days is not a complex task. But exchanging the same data without the interruption of the third party is a critical task. Two most powerful and popular techniques to achieve that are introduced based on the concept of secret writing. They are Steganography and Cryptography. Mostly Steganography concepts has been used for hiding the data in text files or images or videos or audio in-short via Multimedia. Cryptographic tools are developed for exchanging concealed data without any interruption (Alazab, Shalaginoy, Mesleh, Awajan, 2020). At the same time, Steganography tools are developed to maintain the secrecy of the concealed data in Multimedia.
The main indicators of the steganographic system are Capacity, Security and Interoperability. These parameters are interdependent means that a parameter value effects the remaining values (Xintao, Daidou, Nao, Boxia, Mengxiao, Chuan, 2020)Steganography means “Covered Writing” in Greek. Steganography is the complement of Cryptography and its goal is to hide the presence of a message and to create a covert channel (Chunfang, Fenlin, Shuangkui, Jicang, Junwei, 2019). A prominent steganography instance is simmon’s prisoner’s problem (Feng, Zhang, Dawei, Zhanyang, Shaohua, Lianyong, 2019). They were considering the famous example of Bob and Alice. Depending on the model proposed in this paper, Bob is the sender and Alice is the receiver. Bob is willing to share some concealed data with Alice but not in a common way. He used this Steganography technique and hide the data in an image and transmitted to the Alice. At the receiver end Alice knowing about the technique can easily extract the data hidden in the image. Generally, any unauthorised persons (intruders) without prior knowledge of the technique used by the authorised persons can only download the image but will not be able to extract the hidden information. Attackers are using some of these techniques to add the dangerous malicious data to disrupt the target systems or individuals (Sairam, Boopathybagan, 2019).
The main goal of steganography is defeating the identification of hidden data. However, this approach became a victim of several passive and active attacks. Later, people have used this method to do illegal activities like cyberwars, cyber-attacks, etc(Rupa, Thippa, M.H, 2020). Day by day, this approach's utilization is increasing by the industry and government for sharing the sensitive data among the authorized partners. Statistical and quantitative steganalysis have often used to identify the data within the multimedia (Rupa, 2020). Generally, steganography uses to conceal the data by authorized persons and deceive the data by the intended persons only. It is a type of covert communication and also helpful to work on complex communication models. It itself has some strengths and weaknesses (Alazab, Venkataraman, Watters, Alazab, 2013).
In olden days, at the sender side a technique involving writing crypto messages on an empty paper with wax making it invisible is used. Later at receiver side, heat is applied to the paper to extract the secret message. This technique is named as Secret Writing (Silman, 2001, Neha, 2015). During Second World War, a famous king used Micro dot Technology to transfer large amount of data. The dots' spaces are considered periods, and the crypted dot is the message (Cole, 2001) (Rupa, 2017). These incidents are motivated to develop an application system that is used to scan multiple images and displays whether the images have any hidden information. This type of applications will be best suited for forensic analysis (Imam, Vassilakis, 2019) (Samiksha, Mahip, Bartere, 2015).