Skip to main content

A Review on GIF-Based Steganography Techniques

  • Conference paper
  • First Online:
Proceedings of International Conference on Recent Innovations in Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1001))

  • 306 Accesses

Abstract

Data privacy has been a significant concern since the beginning of the Internet, and in the current scenario, the need and importance of data privacy are increasing exponentially. Today, a multitude of media formats including text, images, videos, Graphics Interchange Format (GIFs), etc., are available for exchanging data, and techniques of cryptography and steganography play a key role in maintaining data secrecy during such transmissions. This paper elaborates on the GIF-based techniques of steganography. It provides a detailed comparison of the working, advantages and limitations of the major approaches developed in this field in the last three decades. It provides a clear and chronological understanding regarding the evolution of GIF-based steganography methods and discusses future directions to enhance the existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anton AI, Earp JB, Young JD (2010) How internet users’ privacy concerns have evolved since 2002. IEEE Secur Priv 8(1):21–27

    Article  Google Scholar 

  2. Bajwa IS, Riasat R (2011) A new perfect hashing based approach for secure stegnograph. In: 2011 sixth international conference on digital information management. IEEE, pp 174–178

    Google Scholar 

  3. Balagyozyan L, Hakobyan R (2021) Steganography in frames of graphical animation. In: E3S web of conferences, vol 266. EDP Sciences, p 09006

    Google Scholar 

  4. Barakat M, Eder C, Hanke T (2018) An introduction to cryptography. Timo Hanke at RWTH Aachen University, pp 1–145

    Google Scholar 

  5. Basak RK, Chatterjee R, Dutta P, Dasgupta K (2022) Steganography in color animated image sequence for secret data sharing using secure hash algorithm. Wirel Pers Commun 122(2):1891–1920

    Article  Google Scholar 

  6. Basak RK, Dasgupta K, Dutta P (2018) Steganography in grey scale animated GIF using hash based pixel value differencing. In: 2018 fourth international conference on research in computational intelligence and communication networks (ICRCICN). IEEE, pp 248–252

    Google Scholar 

  7. Drumm K True colour and indexed colour bitmaps. https://youtu.be/cwHPuU3sHOk?t=309

  8. Fridrich J (1999) A new steganographic method for palette-based images. In: PICS, pp 285–289

    Google Scholar 

  9. Juzar MT, Munir R (2016) Message hiding in animated GIF using multibit assignment method. In: 2016 international symposium on electronics and smart devices (ISESD). IEEE, pp 225–229

    Google Scholar 

  10. Kaur N, Behal S (2014) A survey on various types of steganography and analysis of hiding techniques. Int J Eng Trends Technol 11(8):388–392

    Article  Google Scholar 

  11. Larbi SD, Zaien A, Sevestre-Ghalila S (2016) Voicing of animated GIF by data hiding—a technique to add sound to the gif format. Multim Tools Appl 75(8):4559–4575

    Article  Google Scholar 

  12. Lin J, Qian Z, Wang Z, Zhang X, Feng G (2020) A new steganography method for dynamic GIF images based on palette sort. Wirel Commun Mob Comput 2020

    Google Scholar 

  13. Munir R (2016) Application of the modified ezstego algorithm for hiding secret messages in the animated GIF images. In: 2016 2nd international conference on science in information technology (ICSITech). IEEE, pp 58–62

    Google Scholar 

  14. Wang X, Yao T, Li CT (2005) A palette-based image steganographic method using colour quantisation. In: IEEE international conference on image processing 2005, vol 2. IEEE, pp II–1090

    Google Scholar 

  15. Wong K, Nazeeb MN, Dugelay JL (2020) Complete quality preserving data hiding in animated GIF with reversibility and scalable capacity functionalities. In: International workshop on digital watermarking. Springer, pp 125–135

    Google Scholar 

  16. Wu MY, Ho YK, Lee JH. (2003) A method to improve the stego-image quality for palette-based image steganography. In: International workshop on digital water-marking. Springer, pp 483–496

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhinav Chola .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chola, A., Awasthi, L.K., Singh, S. (2023). A Review on GIF-Based Steganography Techniques. In: Singh, Y., Singh, P.K., Kolekar, M.H., Kar, A.K., Gonçalves, P.J.S. (eds) Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001. Springer, Singapore. https://doi.org/10.1007/978-981-19-9876-8_22

Download citation

Publish with us

Policies and ethics