Author:
Isloure Araujo Istteffanny
Abstract
This chapter explores the use of steganography on digital files and produces an enhanced technique that addresses the major vulnerabilities that make algorithms less reliable in securing data. Through a review of historical techniques in the field, the study identifies weaknesses in the algorithms to improve security and increase capacity using different techniques. One of the approaches proposed in this study involves a distributed method, which is simple, clear, low-cost, and agile. The study also analyses data manipulation and embedding processes in different files and for different purposes, such as vulnerabilities or placeholders exploited by criminals distributing viruses over the internet using Steganography. The results of the study can help forensic analysts identify secret content and raise awareness about protecting against eavesdropping data on devices. The study proposes a new scheme to improve Steganography called DSoBMP, together with guideline materials that have been published in four international peer-reviewed journals, including Springer and used as a stepping stone to collaborate in a worldwide book publication.
Reference35 articles.
1. Kalaivanan SA. A survey on digital image steganography. International Journal of Emerging Trends and Technology in Computer Science. 2015;:30-33
2. Zhang R, Dong S, Liu J. Invisible steganography via generative adversarial networks. Multimedia Tools and Applications. 2018;:8559-8575. DOI: 10.1007/s11042-018-6951-z
3. Koptyra K, Ogiela M. Distributed steganography in PDF files—Secrets hidden in modified pages. Entropy. 2020;(6):30-59
4. Mills R. The Metadata in JPEG files. 2018. Available from: [Accessed: May 15, 2021]
5. Chandramoulia R, Memon N. Steganography Capacity: A Steganalysis Perspective. Vol. 1(1). New York, USA: A Department of E.C.E., Stevens Institute of Technology; 2015. pp. 1-5