CFP last date
20 December 2024
Reseach Article

Analysis of Image Steganography Techniques: A Survey

by Pooja Rai, Sandeep Gurung, M.k. Ghose
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 1
Year of Publication: 2015
Authors: Pooja Rai, Sandeep Gurung, M.k. Ghose
10.5120/19941-1731

Pooja Rai, Sandeep Gurung, M.k. Ghose . Analysis of Image Steganography Techniques: A Survey. International Journal of Computer Applications. 114, 1 ( March 2015), 11-17. DOI=10.5120/19941-1731

@article{ 10.5120/19941-1731,
author = { Pooja Rai, Sandeep Gurung, M.k. Ghose },
title = { Analysis of Image Steganography Techniques: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 1 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number1/19941-1731/ },
doi = { 10.5120/19941-1731 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:32.283205+05:30
%A Pooja Rai
%A Sandeep Gurung
%A M.k. Ghose
%T Analysis of Image Steganography Techniques: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 1
%P 11-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the technique of hiding data in an appropriate multimedia carrier, e. g. , image, audio, and video files known as Cover. Images are mostly used as the cover medium due to their pervasiveness in different applications and representation with high redundancy. This paper provides a review and analysis of many existing methods for digital image steganography in the spatial as well as transform domain. The performance evaluation of the algorithms with respect to the proposed analysis parameters are summarized along with their limitations inorder to throw some light on the utility of the algorithm as per the requirement of application.

References
  1. G. Simmons, The Prisoners problem and the subliminal channel, CRYPTO, pp. 51-67, 1983.
  2. Ron Crandall, Some Notes on Steganography, Posted on Steganography Mailing List, 1998. Source: http://www. dia. unisa. it/~ads/corso security/www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding. pdf
  3. Neil F. Johnson, Stefan C. Katzenbeisser, A Survey of Steganographic Techniques, Information Hiding Techniques for Steganography and Watermarking, edited by Stefan Katzenbeisser and Fabien A. P. Petitcolas, pp. 45, Artech House Inc, 2000.
  4. A. Westfeld, F5-A Steganographic Algorithm: High capacity despite better steganalysis, Proc. 4th International Workshop on Information Hiding, 2001, vol. 2137, pp. 289-302, Springer, 2001.
  5. Chi-Kwong Chan, L. M. Cheng, Improved hiding data in images by optimal moderately signifcant-bit replacement, IEE Electron Lett. 37 (16) (2001) 1017–1018.
  6. R. Chandramouli, Nasir Memon, Analysis of LSB based Image Steganography Techniques, Proc. International Conference on Image Processing, 2001, Vol. 3, pp. 1019-1022, 2001.
  7. Jessica Fridrich, Miroslav Goljan, Dorin Hogea, Attacking the OutGuess, Proc. of 2002 ACM Workshop on Multimedia and Security, ACM Press, pp. 3-6, 2002.
  8. Jessica Fridrich, MiroslavGoljan, DorinHogea, Steganalysis of JPEG Images: Breaking the F5 Algorithm, Proc. of the 5th Information Hiding Workshop, Springer, vol. 2578, pp. 310-323, 2002.
  9. P. Sallee, Model-based steganography, in: Proceedings of the Second International Workshop on Digital Watermarking, Seoul, Korea, October 20–22, 2003, Lecture Notes in Computer Science, vol. 2939, pp. 254–260.
  10. N. Provos, P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security and Privacy, 1(3) (2003)32–44.
  11. Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon, Image Steganography: Concepts and Practice, WPSC/Lecture Note Series, pp. 4, April, 2004. Source: www2. ims. nus. edu. sg/preprints/ab2004-25. pdf
  12. Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon, Image Steganography: Concepts and Practice, WPSC/Lecture Note Series, pp. 3, April, 2004.
  13. T Morkel, J. H. P Eloff, M. S Olivier, An Overview Of Image Steganography. Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), 2005.
  14. Po-Yueh Chen and Hung-Ju Lin, A DWT Based Approach for Image Steganography. International Journal of Applied Science and Engineering 2006. 4, 3: 275-290
  15. N. -I. Wu, M. -S. Hwang, Data hiding: Current status and key issues, Int. J. Netw. Secur. 4 (2007) 1–9.
  16. Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani, Steganalysis of Pixel-Value Differencing Steganographic Method, Proc. IEEE PacificRim Conference on Communications, Computers and Signal Processing, 2007, pp. 292-295.
  17. A. Cheddad, J. Condell, K. Curran and P. McKevitt, Digital Image Steganography: Survey and Analysis of Current Methods, Signal Processing, Volume 90, Issue 3, pp. 727-752, March 2010.
  18. Chi-Kwong Chan, L. M. Cheng, Hiding data in images by simple LSB substitution, Pattern Recognition, Vol. 37, pp. 469-474, 2010.
  19. R. Amritharajan, R. Akila, P. Deepika chowdavarapu, A Comparative Analysis of Image Steganography, International Journal of Computer Applications, Vol. 2, No. 3, pp. 41-47, 2010.
  20. Adnan Abdul-Aziz Gutub, Pixel Indicator Technique for RGB Image Steganography, Journal of Emerging Technologies in Web Intelligence, Vol 2, No 1 (2010), pp. 56-64, Feb 2010.
  21. Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri, A Session based Multiple Image Hiding Technique using DWT and DCT, International Journal of Computer Applications (0975 – 8887) Volume 38– No. 5, January 2012
  22. Ratnakirti Roy, Suvamoy Changder, Anirban Sarkar, Narayan C Debnath. Evaluating Image Steganography Techniques: Future Research Challenges. 2978-1-4673-2088-7/13/$31. 00 ,2013, IEEE
  23. Shabnam Samima, Ratnakirti Roy, Suvamoy Changder. Secure Key Based Image Realization Steganography in Image Information Processing (ICIIP), 2013 IEEE Second International Conference on 01/2013 pp. 377-382
  24. Swapnali Zagade, Smita Bhosale, Secret Data Hiding in Images by using DWT Technique's . International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-3, Issue-5, June 2014
  25. Mansi S. Subhedara, Vijay H. Mankarb. Current status and key issues in image steganography: A survey. COMPUTER SCIENCE REVIEW 13–14 (2014) 95–113
  26. Ratnakirti Roy, Suvamoy Changder. Image Realization Steganography with LCS based Mapping. Proc. Contemporary Computing (IC3), 2014 Seventh International Conference. ISBN: 978-1-4799-5172-7, pp. 218 – 223, August 2014, IEEE
Index Terms

Computer Science
Information Sciences

Keywords

Cover Steganography Stegos grafia blockiness