CFP last date
20 December 2024
Reseach Article

A Survey on Various Approaches of Image Steganography

by Priyanka B. Kutade, Parul S. Arora Bhalotra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 3
Year of Publication: 2015
Authors: Priyanka B. Kutade, Parul S. Arora Bhalotra
10.5120/19165-0620

Priyanka B. Kutade, Parul S. Arora Bhalotra . A Survey on Various Approaches of Image Steganography. International Journal of Computer Applications. 109, 3 ( January 2015), 1-5. DOI=10.5120/19165-0620

@article{ 10.5120/19165-0620,
author = { Priyanka B. Kutade, Parul S. Arora Bhalotra },
title = { A Survey on Various Approaches of Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 3 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number3/19165-0620/ },
doi = { 10.5120/19165-0620 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:47.430827+05:30
%A Priyanka B. Kutade
%A Parul S. Arora Bhalotra
%T A Survey on Various Approaches of Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 3
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is an art of concealing the fact with the purpose of communication, by hiding one information in other information. In steganography, many different carrier file formats are used now days, but the digital images are most popular for hiding information because of their frequency on Internet. There is a large variety of techniques of steganography are available for hiding secret information into images. Each of them has its strong & weak points. Choice of which steganography technique is used it depends on the different requirements of the application. For example, some applications may have need of a bigger secret message to be concealed and some need absolute invisibility of the secret message. This paper gives an overview of different techniques used for image steganography. Among these following techniques DCT & DWT techniques are widely used because of their efficiency.

References
  1. Dr. Sudeep Thepade, Smita S. Chavan, " Appraise Of Multifarious Image Steganography Techniques", (IJERA) International Journal of Engineering Research and Applications Vol. 3, Issue 2, March -April 2013, ISSN: 2248-9622
  2. T Morkel, MS Olivier and JHP Eloff, "An Overview of Image Steganography," (ISSA2005), in Proceedings of the Fifth Annual Information Security South Africa Conference Sandton, South Africa, (Published electronically) June/July 2005
  3. M, Raju, B, Priya, Suchitra, "Image Steganography Based On DCT Algorithm for Data Hiding", (IJARCET) International Journal of Advanced Research in Computer Engineering & Technology Volume 2, Issue 11, November 2013 3003
  4. Rosziati Ibrahim and Teoh Suk Kuan, "Steganography Algorithm to Hide Secret Message inside an Image", Computer Technology and Application 2 (2011) 102-108, Published: February 25, 2011.
  5. Rupinder Kaur, Mandeep Kaur, Rahul Malhotra, " A New Efficient Approach towards Steganography", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2) , 2011, 673-676
  6. Adnan Abdul-Aziz and Gutub Mohammad Tanvir Parvez, "RGB Intensity Based Variable-Bits Image Steganography", IEEE Asia-Pacific Services Computing Conference 2008
  7. LinjieGuo, Student Member, IEEE, Jiangqun Ni, Member, IEEE, and Yun Qing Shi, Fellow, IEEE, "Uniform Embedding for Efficient JPEG Steganography", IEEE Transactions On Information Forensics And Security, Vol. 9, No. 5, May 2014
  8. A. A. Al-Saffar , "Proposed Steganography Method Based on DCT Coefficients", IBN AL- HAITHAM J. FOR PURE & APPL. SCI. VOL. 24 (3) 2011
  9. Jiri Fridrich, "A New Steganographic Method for Palette-Based Images", Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000
  10. Surbhi Gupta, Parvinder S. Sandhu, "Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme", International Journal of Research in Engineering and Technology (IJRET) Vol. 2, No. 4, 2013 ISSN 2277 – 4378
  11. Hung-Ju Lin, Po-Yueh Chen, "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering 2006.
  12. Dr. Harish Rohil, Parul1, Manju2, "Optimized Image Steganography using Discrete Wavelet Transform (DWT)", International Journal of Recent Development in Engineering and Technology, ISSN 2347 - 6435 (Online) Volume 2, Issue 2, February 2014
  13. Er. Rohini Sharma, Er. Mahender Singh, Er. Dinesh Garg, " A New Purposed Issue for Secure Image Steganography Technique Based On 2-D Block DCT and DCT", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, July 2012 ISSN: 2277 128X
  14. Sarojkumar Lenka, Gandharba Swain, "A Novel Approach To RGB Channel Based Image Steganography Technique", International Arab Journal of e-Technology, Vol. 2 , No. 4, June 2012.
  15. Deepak Singla1, Rupali Syal2, "Data Security Using LSB & DCT Steganography In Images", International Journal Of Computational Engineering Research/ ISSN: 2250–3005
  16. Mamta Juneja and Parvinder S. Sandhu, "An Improved LSB Based Steganography Technique for RGB Color Images", International Journal of Computer and Communication Engineering, Vol. 2, No. 4, July 2013
  17. B. Padmasri, M. Amutha surabi, "Spread Spectrum Image Steganography with Advanced Encryption Key Implementation", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013 ISSN: 2277 128X
  18. Ankit Gupta, Rahul Garg, "Detecting LSB Steganography in Images"
  19. Barnali Gupta Banik, Prof. Samir K. Bandyopadhyay, "A DWT Method for Image Steganography", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013, ISSN: 2277 128X
  20. Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal, " Implementation of Image Steganography Using 2-Level DWT Technique", International Journal of Computer Science and Business Informatics
  21. Ajit Danti, Preethi Acharya, "Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography", IJCA Special Issue on "Recent Trends in Image Processing and Pattern Recognition" RTIPPR, 2010.
  22. S. S. Nassar, N. M. Ayad, M. H. Kelash, O. S. , M. A. M. El-Bendary, "Image Contents Verification Algorithm using Transform Domain Techniques" International Journal of Computer Applications (0975 – 8887) Volume 97– No. 9, July 2014
  23. Nilam N Ghuge, Parul S Arora Bhalotra, B. D. Shinde, "CBIR using Textural Feature", International Journal of Computer Applications, Volume 56– No. 11, October 2012
  24. Nilam N Ghuge, Parul S Arora Bhalotra, B. D. Shinde,"Shot Boundary Detection for a Video under the Influence of Illumination: A Adaptive Thresholding Approach, International Journal of Computer Applications, Volume 56– No. 11, October 2012
  25. Parul S. Arora Bhalotra, Bhushan D. Patil, "Shot Boundary Detection using Radon Projection Method" ACEEE Int. J. on Signal and Image Processing , Vol. 4, No. 3, Sept 2013
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography DWT LSB DCT