Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2021-02, Vol.80 (4), p.5723-5771
Hauptverfasser: Dalal, Mukesh, Juneja, Mamta
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5771
container_issue 4
container_start_page 5723
container_title Multimedia tools and applications
container_volume 80
creator Dalal, Mukesh
Juneja, Mamta
description Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.
doi_str_mv 10.1007/s11042-020-09929-9
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2484418431</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2484418431</sourcerecordid><originalsourceid>FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</originalsourceid><addsrcrecordid>eNp9kE9LxDAUxIMouK5-AU8BL3qIvpekTepNlvUPLHhQzyFt0pplbdekPfTbW63gzdMbHjPD8CPkHOEaAdRNQgTJGXBgUBS8YMUBWWCmBFOK4-GkhQamMsBjcpLSFgDzjMsF2bz0vrFt10S7fx-pbR2dP3Y3ppDoZWipC03o7Y7WXfRtClW6uqWWrsbSx-SrIYZ-pM0QnD8lR7XdJX_2e5fk7X79unpkm-eHp9XdhlUiVz1z01SuEbjNaltXItNYOi1zyCpR1mi9Elw69NwpJ3NR1OhVbqXWRVZyKKVYkou5dx-7z8Gn3my7IU6Tk-FSS4laCpxcfHZVsUsp-trsY_iwcTQI5puamamZiZr5oWaKKSTmUJrMbePjX_U_qS-VMG7u</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2484418431</pqid></control><display><type>article</type><title>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</title><source>SpringerLink Journals - AutoHoldings</source><creator>Dalal, Mukesh ; Juneja, Mamta</creator><creatorcontrib>Dalal, Mukesh ; Juneja, Mamta</creatorcontrib><description>Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-020-09929-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer forensics ; Computer Science ; Cybersecurity ; Data Structures and Information Theory ; Forensic computing ; Forensic sciences ; Multimedia ; Multimedia Information Systems ; Security systems ; Special Purpose and Application-Based Systems ; Steganography ; Trends</subject><ispartof>Multimedia tools and applications, 2021-02, Vol.80 (4), p.5723-5771</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</citedby><cites>FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</cites><orcidid>0000-0002-3473-6652</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-020-09929-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-020-09929-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Dalal, Mukesh</creatorcontrib><creatorcontrib>Juneja, Mamta</creatorcontrib><title>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.</description><subject>Computer Communication Networks</subject><subject>Computer forensics</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Data Structures and Information Theory</subject><subject>Forensic computing</subject><subject>Forensic sciences</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Security systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Steganography</subject><subject>Trends</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE9LxDAUxIMouK5-AU8BL3qIvpekTepNlvUPLHhQzyFt0pplbdekPfTbW63gzdMbHjPD8CPkHOEaAdRNQgTJGXBgUBS8YMUBWWCmBFOK4-GkhQamMsBjcpLSFgDzjMsF2bz0vrFt10S7fx-pbR2dP3Y3ppDoZWipC03o7Y7WXfRtClW6uqWWrsbSx-SrIYZ-pM0QnD8lR7XdJX_2e5fk7X79unpkm-eHp9XdhlUiVz1z01SuEbjNaltXItNYOi1zyCpR1mi9Elw69NwpJ3NR1OhVbqXWRVZyKKVYkou5dx-7z8Gn3my7IU6Tk-FSS4laCpxcfHZVsUsp-trsY_iwcTQI5puamamZiZr5oWaKKSTmUJrMbePjX_U_qS-VMG7u</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Dalal, Mukesh</creator><creator>Juneja, Mamta</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-3473-6652</orcidid></search><sort><creationdate>20210201</creationdate><title>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</title><author>Dalal, Mukesh ; Juneja, Mamta</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Communication Networks</topic><topic>Computer forensics</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Data Structures and Information Theory</topic><topic>Forensic computing</topic><topic>Forensic sciences</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Security systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Steganography</topic><topic>Trends</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dalal, Mukesh</creatorcontrib><creatorcontrib>Juneja, Mamta</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dalal, Mukesh</au><au>Juneja, Mamta</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-02-01</date><risdate>2021</risdate><volume>80</volume><issue>4</issue><spage>5723</spage><epage>5771</epage><pages>5723-5771</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-020-09929-9</doi><tpages>49</tpages><orcidid>https://orcid.org/0000-0002-3473-6652</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2021-02, Vol.80 (4), p.5723-5771
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2484418431
source SpringerLink Journals - AutoHoldings
subjects Computer Communication Networks
Computer forensics
Computer Science
Cybersecurity
Data Structures and Information Theory
Forensic computing
Forensic sciences
Multimedia
Multimedia Information Systems
Security systems
Special Purpose and Application-Based Systems
Steganography
Trends
title Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T03%3A45%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Steganography%20and%20Steganalysis%20(in%20digital%20forensics):%20a%20Cybersecurity%20guide&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Dalal,%20Mukesh&rft.date=2021-02-01&rft.volume=80&rft.issue=4&rft.spage=5723&rft.epage=5771&rft.pages=5723-5771&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-020-09929-9&rft_dat=%3Cproquest_cross%3E2484418431%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2484418431&rft_id=info:pmid/&rfr_iscdi=true