Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of t...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2021-02, Vol.80 (4), p.5723-5771 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5771 |
---|---|
container_issue | 4 |
container_start_page | 5723 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Dalal, Mukesh Juneja, Mamta |
description | Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis. |
doi_str_mv | 10.1007/s11042-020-09929-9 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2484418431</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2484418431</sourcerecordid><originalsourceid>FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</originalsourceid><addsrcrecordid>eNp9kE9LxDAUxIMouK5-AU8BL3qIvpekTepNlvUPLHhQzyFt0pplbdekPfTbW63gzdMbHjPD8CPkHOEaAdRNQgTJGXBgUBS8YMUBWWCmBFOK4-GkhQamMsBjcpLSFgDzjMsF2bz0vrFt10S7fx-pbR2dP3Y3ppDoZWipC03o7Y7WXfRtClW6uqWWrsbSx-SrIYZ-pM0QnD8lR7XdJX_2e5fk7X79unpkm-eHp9XdhlUiVz1z01SuEbjNaltXItNYOi1zyCpR1mi9Elw69NwpJ3NR1OhVbqXWRVZyKKVYkou5dx-7z8Gn3my7IU6Tk-FSS4laCpxcfHZVsUsp-trsY_iwcTQI5puamamZiZr5oWaKKSTmUJrMbePjX_U_qS-VMG7u</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2484418431</pqid></control><display><type>article</type><title>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</title><source>SpringerLink Journals - AutoHoldings</source><creator>Dalal, Mukesh ; Juneja, Mamta</creator><creatorcontrib>Dalal, Mukesh ; Juneja, Mamta</creatorcontrib><description>Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-020-09929-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer forensics ; Computer Science ; Cybersecurity ; Data Structures and Information Theory ; Forensic computing ; Forensic sciences ; Multimedia ; Multimedia Information Systems ; Security systems ; Special Purpose and Application-Based Systems ; Steganography ; Trends</subject><ispartof>Multimedia tools and applications, 2021-02, Vol.80 (4), p.5723-5771</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</citedby><cites>FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</cites><orcidid>0000-0002-3473-6652</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-020-09929-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-020-09929-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Dalal, Mukesh</creatorcontrib><creatorcontrib>Juneja, Mamta</creatorcontrib><title>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.</description><subject>Computer Communication Networks</subject><subject>Computer forensics</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Data Structures and Information Theory</subject><subject>Forensic computing</subject><subject>Forensic sciences</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Security systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Steganography</subject><subject>Trends</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE9LxDAUxIMouK5-AU8BL3qIvpekTepNlvUPLHhQzyFt0pplbdekPfTbW63gzdMbHjPD8CPkHOEaAdRNQgTJGXBgUBS8YMUBWWCmBFOK4-GkhQamMsBjcpLSFgDzjMsF2bz0vrFt10S7fx-pbR2dP3Y3ppDoZWipC03o7Y7WXfRtClW6uqWWrsbSx-SrIYZ-pM0QnD8lR7XdJX_2e5fk7X79unpkm-eHp9XdhlUiVz1z01SuEbjNaltXItNYOi1zyCpR1mi9Elw69NwpJ3NR1OhVbqXWRVZyKKVYkou5dx-7z8Gn3my7IU6Tk-FSS4laCpxcfHZVsUsp-trsY_iwcTQI5puamamZiZr5oWaKKSTmUJrMbePjX_U_qS-VMG7u</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Dalal, Mukesh</creator><creator>Juneja, Mamta</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-3473-6652</orcidid></search><sort><creationdate>20210201</creationdate><title>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</title><author>Dalal, Mukesh ; Juneja, Mamta</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c367t-d04228102a5fafc3581bd84605c3bf1ae7324d1e2d7d4639f1e76a48895b20b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Communication Networks</topic><topic>Computer forensics</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Data Structures and Information Theory</topic><topic>Forensic computing</topic><topic>Forensic sciences</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Security systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Steganography</topic><topic>Trends</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dalal, Mukesh</creatorcontrib><creatorcontrib>Juneja, Mamta</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dalal, Mukesh</au><au>Juneja, Mamta</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Steganography and Steganalysis (in digital forensics): a Cybersecurity guide</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-02-01</date><risdate>2021</risdate><volume>80</volume><issue>4</issue><spage>5723</spage><epage>5771</epage><pages>5723-5771</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-020-09929-9</doi><tpages>49</tpages><orcidid>https://orcid.org/0000-0002-3473-6652</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-02, Vol.80 (4), p.5723-5771 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2484418431 |
source | SpringerLink Journals - AutoHoldings |
subjects | Computer Communication Networks Computer forensics Computer Science Cybersecurity Data Structures and Information Theory Forensic computing Forensic sciences Multimedia Multimedia Information Systems Security systems Special Purpose and Application-Based Systems Steganography Trends |
title | Steganography and Steganalysis (in digital forensics): a Cybersecurity guide |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T03%3A45%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Steganography%20and%20Steganalysis%20(in%20digital%20forensics):%20a%20Cybersecurity%20guide&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Dalal,%20Mukesh&rft.date=2021-02-01&rft.volume=80&rft.issue=4&rft.spage=5723&rft.epage=5771&rft.pages=5723-5771&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-020-09929-9&rft_dat=%3Cproquest_cross%3E2484418431%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2484418431&rft_id=info:pmid/&rfr_iscdi=true |