International Journal of Computer Applications (0975 8887) National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) 1 The Act of Steganography from Ancient Era to Digital Age N.D. Jambhekar Department of Computer Science S.S.S.K.R. Innani Mahavidyalaya Karanja (Lad), Dist. Washim (M.S.), India C.A. Dhawale MCA Department P.R. Pote College of Engineering & Management Amravati (M.S.), India ABSTRACT Digital data in the form of text, images, audio and video are transmitted over the internet by means of communication links. The confidentiality of secret data should preserve from intruders. Steganography has a group of methods with which different algorithms are used to embed the secret data under the cover medium such as image, without any detectable indications on the cover image. This paper focuses on some image steganographic methods used from many years, the methods used currently and the capabilities of steganography in future. Keywords Steganography, attacks, steganalysis. 1. INTRODUCTION Effective and efficient steganographic algorithms are those who hide the sensitive data under the cover medium such as image, without leaving any detectable clue to the intruders. The strength of the steganographic algorithms is to keep the confidential information under an image such a way that, no any steganalysis method, or tool extracts the original secret message from the cover image without finding right stegokey. Stegokey is used to merge the secret data under the cover image. The stegokey is unique and used for encryption and same for decryption. This stegokey must be preserved by both sender and receiver. Recently, many researchers have worked on steganography and written the benefits of the different steganographic algorithms. In this paper, we are analyzing some digital image steganographic algorithms used in past years, currently practiced methods and giving focus on the capabilities of steganography in the future. Steganography is a group of methods used for securing the secret information under the cover medium such as an image using some translation rules. Here the translation rules merge the selected text into the image, that makes the simple text secure and no one can easily plunder the secret information. Because of steganography two communication sides transfer the confidential data secretly where attacker unknown the secret message covered in other medium such as cover images [19]. Steganography is the technique in which the original message which is being transmitted over the unsecured communication channel will be masked into the cover medium such as image, audio or video such that any human being, the device or the specialized software cannot predict the original hidden data. In steganography, the secret message transmission is possible using two entities such as the original message to be transmitted and the message carrier used to cover the transmitting message. Using the image steganographic method, the secret message is covered by an image in such way that the original message cannot predict by the intruders. The variations are done slightly that do not reflect the visual changes on the cover image. 2. STEGANOGRAPHY IN THE EARLY AGE The Steganography suggest itself as a Greek word made from steganos - covered or secret and graphy - writing or drawing. The first steganographic technique was coming in the history of ancient Greece around 440 B.C. The Greek swayer Histaeus use the steganography in a new way to hide secret messages by shaving messenger’s head, waiting to grow hair again, then again shaving the head and waiting to grow hair, so that the it will hide the secret message under long hair. On the other side, recipient finding the secret message by trimming hairs of messenger. The recipient was also using the same method to reply. During 480 B.C. the next steganographic technique was evolved. Demerstus use the technique of writing the secret message to the Spartans that warns high intrusions by Xerxes. The secret message was put on the surface of wooden wax tablet and again covered with fresh wax. This tablet was delivered to the destination place with its hidden secret message [15, 16]. Johannes Trithemius (1 February 1462 13 December 1516) is a first person who was the German Renaissance humanist, advisor to Emperors in Germany, the founder of scientific bibliography and one of the founders of modern cryptography also wrote the “Steganographia”. He is a first author of the first printed work on cryptography, the Polygraphia [1]. With the publication of Auguste Kerchoffs’, cryptography militaire, although this work was mostly about cryptography, but describes the principal that was helpful in designing the new steganographic system, known as Kerchoff’s principal regarding the steganography [3]. During both world wars, steganography helped to hide the confidential message using invisible ink which would gleam by keeping on the flame [15]. 3. DIGITAL STEGANOGRAPHY TODAY Thereafter the ancient steganographic techniques, many researchers discovered the steganographic algorithms that provide the high security features to secure the digital document. Intruders also develop methods that evacuate the safe message known as the steganalysis. Moreover, the ultimate use of the internet for the communication of the digital document was coming into existence in the recent days. Due to intensive use of internet- an unsecured communication channel, the sensitive data is not safe today.