REVIEW OF STEGANOGRAPHIC METHODS AND THEIR APPLICATION IN SECURING BANKING INFORMATION SYSTEMS

O.G. Umanskiy

Èlektron. model. 2024, 46(4):87-111

https://doi.org/10.15407/emodel.46.04.087

ABSTRACT

The article provides a detailed analysis of modern steganographic methods and their practical applications across various fields, with a focus on the prospects for integration into banking systems. It examines key steganographic methods, including Least Significant Bit (LSB) substitution, Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), as well as hybrid approaches combining steganography with cryptography. The impact of stega­nographic methods on enhancing the security of internal communications, protecting client data, and ensuring the continuity of business processes in the banking sector is analyzed. The article presents real-world examples of implementing steganography to protect online tran­sac-tions and mobile banking, and discusses the main stages of integrating these methods into banking systems, including security requirement analysis, testing, and staff training.

KEYWORDS

steganography, cybersecurity, data protection, cryptography, information security.

REFERENCES

  1. Alhomoud, A. (2021). Image Steganography in Spatial Domain: Current Status, Techniques, and Trends. Intelligent Automation & Soft Computing, 27(1), 69-88. 
    https://doi.org/10.32604/iasc.2021.014773
  2. Provos, N., & Honeyman, P. (2003). Hide and seek: an introduction to steganography. IEEE Security & Privacy, 1(3), 3244. 
    https://doi.org/10.1109/MSECP.2003.1203220
  3. Ding, W., Yan, W., & Qi, D. (2002). Digital image watermarking based on discrete wavelet transform. Journal of Computer Science and Technology, 17(2), 129- 
    https://doi.org/10.1007/BF02962205
  4. Zong, T., Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W. & Beliakov, G. (2015). Robust Histogram Shape-Based Method for Image Watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 25(5), 717-
    https://doi.org/10.1109/TCSVT.2014.2363743
  5. Hameed, M.A., Hassaballah, M., Aly, S., & Awad, A.I. (2019). An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques. IEEE Access, 7, 185189-
    https://doi.org/10.1109/ACCESS.2019.2960254 
  6. Fridrich, J., & Soukal, D. (2006). Matrix Embedding for Large Payloads. IEEE Transactions on Information Forensics and Security, 1(3), 390- 
    https://doi.org/10.1109/TIFS.2006.879281
  7. Sarkar, A., Madhow, U., & Manjunath, B.S. (2010). Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography. IEEE Transactions on Information Forensics and Security, 5(2), 225- 
    https://doi.org/10.1109/TIFS.2010.2046218
  8. Ran-Zan Wang & Yeh-Shun Chen. (2006). High-payload image steganography using two-way block matching. IEEE Signal Processing Letters, 13(3), 161- 
    https://doi.org/10.1109/LSP.2005.862603
  9. Marvel, L. M., Boncelet, C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075- 
    https://doi.org/10.1109/83.777088
  10. Kuznetsov, O., Frontoni, E., & Chernov, K. (2024). Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography. Applied Intelligence
    https://doi.org/10.1007/s10489-024-05415-z
  11. Gutub, A., & Al-Ghamdi, M. (2020). Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools and Applications, 79(11-12), 7951–7985. 
    https://doi.org/10.1007/s11042-019-08427-x
  12. Duan, X., Guo, D., Liu, N., Li, B., Gou, M., & Qin, C. (2020). A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network. IEEE Access, 8, 25777-
    https://doi.org/10.1109/ACCESS.2020.2971528
  13. Islam, M.A., Riad, M.A.-A.K., & Pias, T.S. (2021). Enhancing Security of Image Steganography Using Visual Cryptography. 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). 
    https://doi.org/10.1109/ICREST51555.2021.9331225
  14. Alanzy, M., Alomrani, R., Alqarni, B., & Almutairi, S. (2023). Image Steganography Using LSB and Hybrid Encryption Algorithms. Applied Sciences, 13(21), 11771. 
    https://doi.org/10.3390/app132111771
  15. Saeidi, Z., Yazdi, A., Mashhadi, S., Hadian, M., & Gutub, A. (2023). High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Processing
    https://doi.org/10.1049/ipr2.12938
  16. Alobaidi, T., & Mikhael, W. (2023). An adaptive steganography insertion technique based on wavelet transform. Journal of Engineering and Applied Science, 70(1). 
    https://doi.org/10.1186/s44147-023-00300-x
  17. Baluja, S. (2017). Hiding images in plain sight: Deep steganography. Advances in Neural Information Processing Systems 30 (NIPS 2017), 2066-2076.
  18. Zhu, J., Kaplan, R., Johnson, J., & Fei-Fei, L. (2018). HiDDeN: Hiding Data with Deep Networks. arXiv preprint arXiv:1807.09937. 
    https://doi.org/10.1007/978-3-030-01267-0_40
  19. Shang, Y., Jiang, S., Ye, D., & Huang, J. (2020). Enhancing the Security of Deep Learning Steganography via Adversarial Mathematics, 8(9), 1446.
    https://doi.org/10.3390/math8091446
  20. Magdy, M., Hosny, K.M., Ghali, N.I., & Ghoniemy, S. (2022). Security of medical images for telemedicine: a systematic review. Multimedia Tools and Applications
    https://doi.org/10.1007/s11042-022-11956-7
  21. Yewale, D., Badambe, A., Bagal, Y., & Khade, P. (2016). Steganography Technique Used for Military Application. International Journal of Advance Engineering and Research Development, 3(03). 
    https://doi.org/10.21090/IJAERD.0303128
  22. Gawade, N., More, A., Dange, S., Ingole, S., & Mathaur, S. (2022). Basic of Secrete Communication System for Military by Using ML and Steganography. International Journal for Research in Applied Science & Engineering Technology (IJRASET), 10(V). 
    https://doi.org/10.22214/ijraset.2022.43647
  23. Mughal, F.T., Iranmanesh, V., Fen, G.M., & Yin, J.H.J. (2015). Internet of Things: Securing Data using Image Steganography. 2015 Third International Conference on Artificial Intelligence, Modelling and Simulation
    https://doi.org/10.1109/AIMS.2015.56
  24. Qasim, H.A., & Mohammed, R.S. (2023). Lightweight Steganography Technique in The Internet of Things: A survey. Al-Salam Journal for Engineering and Technology, 3(1), 97–108. 
    https://doi.org/10.55145/ajest.2024.03.01.008
  25. Oleshchenko, V., & Pevnev, V. (2017). Development of digital steganography techniques for copyright protection, based on the watermark. Advanced Information Systems, 1(1), 57–60. 
    https://doi.org/10.20998/2522-9052.2017.1.10
  26. Sae-Tang, W., Fujiyoshi, M., & Kiya, H. (2019). A New Copyright- and Privacy-Protected Image Trading System Using a Novel SteganographyBased Visual Encryption Scheme. ECTI Transactions on Electrical Engineering, Electronics, and Communications, 17(1), 95–107. 
    https://doi.org/10.37936/ecti-eec.2019171.215455
  27. Sae-Tang, W., & Sirikham, A. (2023). Image Steganography-based Copyright and Privacy-Protected Image Trading Systems. ECTI Transactions on Computer and Information Technology (ECTI-CIT)17(3), 358–375. 
    https://doi.org/10.37936/ecti-cit.2023173.252500
  28. Zainal, N., Hoshi, A.R., Ismail, M., T. Rahem, A.A.-R., & Muhsin Wadi, S. (2024). A hybrid steganography and watermark algorithm for copyright protection by using multiple embedding approaches. Bulletin of Electrical Engineering and Informatics, 13(3), 1877–1896. 
    https://doi.org/10.11591/eei.v13i3.6337
  29. Dinesh, S., Shubham, C., Madhavi, J., Sagar, B., Swapnali, B., Jadhav, S.A. (2017). Online secure payment system using steganography and cryptography. International Journal of Advanced in Management, Technology and Engineering Sciences. 7(12), 71-75. https://doi.org/16.10089.IJAMTES.2017.V7I11.15.1977
  30. Orucho, D.O., Awuor, F.M., Makiya, R., & Oduor, C. (2023). Review of Algorithms for Securing Data Transmission in Mobile Banking. Modern Economy, 14(09), 1192–1217. 
    https://doi.org/10.4236/me.2023.149062
  31. Jahnavi, S., Nandini, C. (2023). Multifold Secured Bank Application Authentication Service Using Random Visual Cryptography and Multimodal Steganography with Blockchain Technology. Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, Lecture Notes in Networks and Systems. 540, 119-134. 
    https://doi.org/10.1007/978-981-19-6088-8_12

Full text: PDF