Detection of tampered data using steganography techniques
DOI:
https://doi.org/10.56294/mw2024.587Keywords:
Steganography, Component, Formatting, Style, Signature, Statistical analysisAbstract
Steganography is the practice of hiding data within other data, such as hiding a message within an image. Data tampering is the unauthorized alteration of data. To detect data tampering through steganography techniques, one can use steganalysis, which is the process of detecting the presence of hidden data. Steganalysis techniques include statistical analysis, visual detection, and signature detection. These techniques can be used to detect if an image, audio, or video file has been tampered with by analyzing its statistical properties and comparing them to known properties of original files. Additionally, digital signature can be used to ensure the integrity of the data, by comparing the signature of the original file with the signature of the file that is being verified. Therefore, staying informed about the latest developments and using a combination of different detection methods is necessary for maximum effectiveness.
References
1. "Steganography and steganalysis" by Ingemar J. Cox, Matthew L. Miller, and Jeffrey A. Bloom. This book provides a comprehensive overview of the field of steganography and steganalysis, including methods for data hiding and detection.
2. "A review of image steganography techniques" by V. S. D. R. K. Prasad and K. R. S. Sastry. This article reviews various techniques for hiding data in images and methods for detecting hidden data.
3. "Machine learning-based steganalysis using deep neural networks" by Xiaowei Huang, Wei-Qiang Zhang, and Guo-Jun Qi. This paper presents a machine learning-based method for detecting steganography using deep neural networks.
4. "A survey of audio steganography" by Alex C. Kot. This article provides an overview of techniques for hiding data in audio files and methods for detecting hidden data.
5. "Steganography and steganalysis: concepts, techniques, and tools" by Neil F. Johnson, Zoran Duric, and Sushil Jajodia. This book provides a comprehensive overview of the field of steganography and steganalysis, including methods for data hiding, detection, and countermeasures.
6. "Steganography in Digital Media: Principles, Algorithms, and Applications" by Ingemar J. Cox, Matthew L. Miller, and Jeffrey A. Bloom, published by Cambridge University Press.
7. "Digital Steganography: Concepts, Algorithms and Applications" by Sushmita Ruj, published by Springer.
8. "Detection of steganographic content in digital media" by T. Pevny and J. Fridrich, published in the IEEE Transactions on Information Forensics and Security.
9. "A Survey of Steganography and Steganalysis Techniques" by A. Westfeld, published in the IEEE Journal of Selected Topics in Signal Processing.
10. "Research on Anti-tampering Simulation Algorithm of Block chain-based Supply Chain Financial Big Data" by Fan Zhang and Ye Ding, published in the IEEE.
11. "Analysis of Test Data Tampering Attack on Manufacturing Testing" by Reginald Tetteh and Samah Mohameed Saeed, published in the IEEE.
12. "Reference-free Detection of LSB Steganography Using Histogram Analysis" by Natiq M.Abdali and Zahir M.Hussain, published in the IEEE.
13. "Image tamper detection and multi-scale self-recovery using reference embedding with multi-rate data protection" by Navidi Deneshmandpour and Habibullah Danyal and Mohammad Sadegh Helfroush, published in the IEEE.
14. "Research on Digital Media Image Data Tampering Forensics Technology Based on Improved CNN Algorithm" by Yuan Wang and Ying Li, published in the IEEE.
15. "A steganography implementation" by Beinish Mehboob and Rashid Aziz Faruqi, published in the IEEE.
16. "New proposed practice for secure image combing cryptography steganography and watermarking based on various parameters" by Rupesh Gupta and Tanu Preet Singh, published in the IEEE.
Published
Issue
Section
License
Copyright (c) 2024 Valluri Shiva Venkata Raj Chowdary , Darisi Venkata Sai Bhuvanesh, Jangalapalli Sai Divya, Jaddu Lavanya, A.V.Praveen Krishna , A.Dinesh Kumar (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.