CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Review on Image Steganography Techniques

by Amandeep Kaur, Rupinder Kaur, Navdeep Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 4
Year of Publication: 2015
Authors: Amandeep Kaur, Rupinder Kaur, Navdeep Kumar
10.5120/ijca2015905280

Amandeep Kaur, Rupinder Kaur, Navdeep Kumar . A Review on Image Steganography Techniques. International Journal of Computer Applications. 123, 4 ( August 2015), 20-24. DOI=10.5120/ijca2015905280

@article{ 10.5120/ijca2015905280,
author = { Amandeep Kaur, Rupinder Kaur, Navdeep Kumar },
title = { A Review on Image Steganography Techniques },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 4 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number4/21948-2015905280/ },
doi = { 10.5120/ijca2015905280 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:47.117786+05:30
%A Amandeep Kaur
%A Rupinder Kaur
%A Navdeep Kumar
%T A Review on Image Steganography Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 4
%P 20-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The emerging Internet Technology has led to the need of high level of security of data during its transmission. For this purpose steganography plays a major role in society. Steganography is basically the art of secretly hiding data or message in any cover medium such as an image, audio or video. Hence it allows secret communication to take place without the knowledge of any unintended user. This article gives a brief overview of image steganography and the techniques used for hiding data in the cover image to obtain stego image. The evaluation of performance is based on the value of PSNR.

References
  1. F. A. P. Peticolas,, "Information hiding-a survey", Proceedings of the IEEE, Vol. 87, pp. 1062-1078, 1999.
  2. Provos, N. & P. Honeyman, “Hide and seek: An introductionto steganography”, IEEE Security Privacy, 1(3), pp.32-44, 2003.
  3. T Morkel, J.H.P Eloff, M.S Olivier, “An Overview of Image Steganography”, Proceedings of the Fifth Annual Information Security South Africa Conference, 2005.
  4. Dr. Diwedi Samidha & Dipesh Agrawal, “Random Image Steganography in Spatial Domain”, IEEE International Conference in Emerging Trends, VLSI, Embedded System, Nano Electronics and Telecommunication System, pp1-3, 2013.
  5. K.A. Darabkh, I.F. Jafar, R.T. Al-Zubi, & M. Hawa, “An improved image least significant bit replacement method”, IEEE 37th International Convention in Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp 1182-1186, 2014.
  6. Lalit Kumar Vashishtha Tanima Dutta Arijit Sur, “Least significant bit matching steganalysis based on feature analysis”, IEEE National Conference in Communications (NCC), pp. 1-5, 2013.
  7. Monica Adriana Dagadita, Emil-Ioan Slusanschi, & Razvan Dobre, "Data Hiding Using Steganography ", IEEE 12th International Symposium in Parallel and Distributed Computing, pp. 159-166, 2013.
  8. G.Prabakaran & R.Bhavani, "A modified secure digital image steganography based on Discrete Wavelet Transform", IEEE International Conference In Computing, Electronics and Electrical Technologies (ICCEET), pp. 1096-1100, 2012.
  9. D.R. Denslin Brabin, Dr.V.Sadasivam, “QET Based Steganography Technique for JPEG Images”, IEEE International Conference on Control, Automation, Communication and Energy Conservation, ISBN 978-1-4244-4789-3, 2009.
  10. Discrete Fourier Transform (DFT). Available at: http://in.mathworks.com/help/matlab/math/discrete-fourier-transform-dft.html
  11. Reena M. Patel & D J Shah, “Multiple LSB data hiding based on Pixel value and MSB value”, IEEE Nirma University International Conference on Engineering, pp. 1-5, 2013.
  12. Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar, “An Image Steganography Technique using X-Box Mapping” IEEE International Conference On  Advances in Engineering, Science and Management (ICAESM), pp. 709-713, 2012.
  13. Weiji Luo, Fangjun Huang & Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited” IEEE, Vol.5, No. 2, pp.201-208, 2010.
  14. Miao Maa, Jianhui Lianga, “SAR image segmentation based on Artificial Bee Colony algorithm”, Applied Soft Computing 5205–5214, Elsevier, 2011.
  15. El-Sayed M. El-Alfy, “Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network”, IEEE Symposium in Computational Intelligence and Data Mining (CIDM), pp. 160-165, 2013.
  16. Manoj Kumar Ramaiya, Naveen Hemrajani, Anil Kishore Saxena, “Security improvisation in image steganography using DES”, IEEE 3rd International Conference in Advance Computing (IACC), pp. 1094-1099, 2013.
  17. Zahra Zahedi Kermani and Mansour Jamzad, “A robust steganography algorithm based on texture similarity using gabor filter”, IEEE International Symposium on Signal Processing and Information Technology, pp. 578-582, 2005.
  18. Mohit Garg, “A novel text steganography technique based on html documents”, International Journal of Advanced Science and Technology, Vol 35, pp 129-138, 2012.
  19. Sunny Dagar, “Highly randomized image steganography using secret keys”, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE) , pp. 1-5, 2014.
  20. N. Vinothkumar, & T. Vigneswaran, “Steganographic Method Image Security Based on Optimal Pixel Adjustment Process and Integer Wavelet Transform”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 2, No. 3, pp-261, 2013
Index Terms

Computer Science
Information Sciences

Keywords

Cover image PSNR Steganography Stego image.