CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Survey on Image Steganography Techniques

by Kamred Udham Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 18
Year of Publication: 2014
Authors: Kamred Udham Singh
10.5120/17105-7746

Kamred Udham Singh . A Survey on Image Steganography Techniques. International Journal of Computer Applications. 97, 18 ( July 2014), 10-20. DOI=10.5120/17105-7746

@article{ 10.5120/17105-7746,
author = { Kamred Udham Singh },
title = { A Survey on Image Steganography Techniques },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 18 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 10-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number18/17105-7746/ },
doi = { 10.5120/17105-7746 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:26.730742+05:30
%A Kamred Udham Singh
%T A Survey on Image Steganography Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 18
%P 10-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is an important technique for information hiding in any digital object. Steganography technique is the science that includes communicating secret information in an appropriate digital multimedia cover objects such as audio, video and image files. The main objective of steganography is to hide the existence of the embedded data. Steganography technique has improved the security of existing data hiding techniques by the outstanding development in computational power. Objectives of steganography are Undetectability, robustness and capacity of the concealed data, these key factors that separate it from related techniques like cryptography and watermarking. This paper delivers a survey on digital images steganography and covering its fundamental concepts. The development of image steganographic methods in spatial representation, in JPEG format and also discuss the recent development in the field of image steganography. Specific generally used approaches for increasing steganographic security are summarized and significant research developments are also discussed.

References
  1. Hniels Provos & Peter Honeyman,"Hide & Seek: An Introduction to Steganography" IEEE Computer Society Pub-2003.
  2. Ge Huayong, Huang,"Steganography and Steganalysis Based on Digital Image", International conference & signal Processing-2011IEEE.
  3. N. F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2) (1998) 26-34.
  4. J. C. Judge, Steganography: Past, present, future. SANS Institute publication, http://www. sans. org/reading_room/whitepapers/stenganography/552. php, 2001.
  5. W Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, No. 3 and 4, pp. 313-336, 1996
  6. M. Swanson, M. Kobayashi, and A. Tewfik, "Multimedia data embedding and watermarking technologies," Proceedings of the IEEE, Vol. 86, No. 6, pp. 1064-1087, June 1998.
  7. R. Wolfgang, C. Podilchuk and E. Delp, "Perceptual watermarks for images and video," to appear in the Proceedings of the IEEE, May, 1999. (A copy of this paper is available at: http://www. ece. purdue. edu/~ace).
  8. N. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," IEEE Computer, pp. 26-34, February 1998.
  9. R. B. Wolfgang and E. J. Delp, "Fragile watermarking using the VW2D watermark," Proceedings of the SPIE/IS&T Conference on Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, San Jose, CA, January 1999.
  10. J. Flores?Escalante, J. Pérez?Díaz and R. Gómez?Cárdenas, Design and Implementation of An Electronic Identification Card, Journal Of Applied Research And Technology
  11. Aravind K. Mikkilineni, Osman Arslan , Pei-Ju Chiang, Roy M. Kumontoy, Jan P. Allebach,George T. -C. Chiu, Edward J. Delp, Printer Forensics using SVM Techniques , This research was supported by a grant from the National Science Foundation, under Award Number 0219893
  12. M. Wu, E. Tang, and B. Lin, Data hiding in digital binary image, Proc. of 2000 IEEE International Conference on Multimedia and Expo,vol. 1, pp. 393-396, 2000.
  13. G. Liang, S. Wang, and X. Zhang, Steganography in binary image by checking data-carrying eligibility of boundary pixels, Journal of Shanghai University, vol. 11, no. 3, pp. 272-277, 2007.
  14. Jessica Fridrich, Miroslav Goljan, and Rui Du, Reliable detection of lsb steganography in color and Gray scale images. Proc. of 2001 ACM workshop on Multimedia and security: new challenges, pp. 27-30, ACM Press, 2001.
  15. P. Alvarez, Using extended file information (EXIF) file headers in digital evidence analysis, International Journal of Digital Evidence, Economic Crime Institute (ECI) 2 (3) (2004) 1–5.
  16. V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats", Int. J. Advanced Networking and Applications 868 Volume: 02, Issue: 05, Pages: 868-872 (2011)
  17. Morkel, T. , Eloff, J. H. P. , Olivier, M. S. : An Overview of Image Steganography. University of Pretoria, South Africa (2002)
  18. Wang, H. , Wang, S. : Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM 47(10) (2004)
  19. T. Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceeding of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sand to South Africa, June/July 2005
  20. Eiji Kawaguchi and Richard O. Eason, Principle and applications of bpcs steganography, In Multi-media Systems and Applications, vol. 3528, pp. 464-473, SPIE, 1998.
  21. T. Sharp, An implementation of key-based digital signal steganography, Proc. of the 4th Information Hiding Workshop, vol. 2137, pp. 13-26, Springer, 2001.
  22. J. Mielikainen,Lsb matching revisited, IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
  23. X. Li, B. Yang, D. Cheng, and T. Zeng, A generalization of lsb matching, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009.
  24. J. Fridrich, D. Soukal, and M. Goljan, Maximum likelihood estimation of secret message length embedded using pmk steganography in spatial domain, Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 595-606, 2005.
  25. J. Fridrich and M. Goljan, Digital image steganography using stochastic modulation, Proc. Of IST/SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents V, vol. 5020, pp. 191-202, 2003
  26. D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value diRerencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
  27. B. Chen and G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
  28. H. Noda, M. Niimi, and E. Kawaguchi, High-performance jpeg steganography using quantization index modulation in dct domain, Pattern Recognition Letters, vol. 27, no. 5, pp. 455-461, 2006.
  29. J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1003-1019, 2003.
  30. A. C. Popescu, Statistical tools for digital image forensics, Ph. D. Dissertation, Department of Computer Science, Dartmouth College, USA, 2005. Available from: http://www. cs. dartmouth. edu/~farid/publications/apthesis05. htmlS, on 16-05-07 at 12:20.
  31. X. Li, J. Wang, A steganographic method based upon JPEG and particle swarm optimization algorithm, Information Sciences 177 (15) (2007) 3099–31091.
  32. A. M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in: Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22–23 April 2006, pp. 1–6.
  33. A. I. Hashad, A. S. Madani, A. E. M. A. Wahdan, A robust steganography technique using discrete cosine transform insertion, in: Proceedings of IEEE/ITI Third International Conference on Information and Communications Technology, Enabling Technologies for the New Knowledge Society, 5–6 December 2005, pp. 255–264.
  34. N. Provos, P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security and Privacy 1 (3) (2003) 32–44.
  35. P. Wayner, Disappearing Cryptography, second ed, Morgan Kaufmann Publishers, 2002.
  36. C. Manikopoulos, S. Yun-Qing, S. Sui, Z. Zheng, N. Zhicheng, Z. Dekun, Detection of block DCT-based steganography in gray-scale images, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9–11 December 2002, pp. 355–358.
  37. Derek Upham, Jsteg, http://zooid. org/ paul/crypto/jsteg/.
  38. Allan Latham, Jphide, http://linux01. gwdg. de/ alatham/stego. html.
  39. A. Westfeld, F5-A steganographic algorithm: high capacity despite better steganalysis, in: Proceedings of Fourth International Work-shop on Information Hiding, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, USA, April 2001, pp. 289–302.
  40. A. Westfeld and A. Pfitzmann, Attacks on steganographic systems-breaking the steganographic utilities ezstego, JSteg, steganos, and s-tools-and some lessons learned. Proc. Of the 3rd Information Hiding Workshop, vol. 1768, pp. 61-76, Springer, 1999.
  41. J. Fridrich, T. Pevny, J. Kodovsky Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities, in: Proceedings of the ACM Ninth Workshop on Multimedia & Security, Dallas, Texas, USA, September 20–21, 2007, pp. 3–14.
  42. J. Fridrich, M. Goljan, D. Hogeg, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of Information Hiding: Fifth International Workshop, IH 2002 Noordwijkerhout, The Netherlands, Lecture Notes in Computer Science, Springer, October 7–9, 2002, 2578/2003, pp. 310–323.
  43. N. Provos, P. Honeyman, Detecting steganographic content on the Internet, Centre for Information Technology Integration, University of Michigan, Technical report, August 31, 2001
  44. N. Provos, Defending against statistical steganalysis, Centre for Information Technology Integration, University of Michigan, Technical report, February 2001.
  45. K. Solanki, A. Sarkar, and B. S. Manjunath, Yass: Yet another steganographic scheme that resists blind steganalysis, Proc. of the 9th Information Hiding Workshop, Springer, vol. 4567, pp. 16-31, 2007.
  46. J. Fridrich, Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes, Proc. of the 6th Information Hiding Workshop, Springer, vol. 3200 , pp. 67-81, 2004.
  47. Tomas Pevny and Jessica Fridrich, Merging markov and dct features for multi-class jpeg steganalysis. Proc. of SPIE: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 3-14, 2007.
  48. Lifang Yu, Yao Zhao, Rongrong Ni, and Yun Q. Shi, A high-performance yass-like scheme using randomized big-blocks, Proc. of the IEEE International Conference on Multimedia and Expo (ICME 2010), 2010.
  49. Fangjun Huang, Jiwu Huang, and Yun Qing Shi, An experimental study on the security performance of YASS, IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 374-380, 2010.
  50. W. Y. Chen, Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation, Applied Mathematics and Computation 185 (1) (2007) 432–448.
  51. V. M. Potdar, S. Han, E. Chang, A survey of digital image water-marking techniques, in: Proceedings of the IEEE Third International Conference on Industrial Informatics (INDIN), Perth, Australia, 10–12 August 2005, pp. 709–716.
  52. B. Verma, S. Jain, D. P. Agarwal, Watermarking image databases: a review, in: Proceedings of the International Conference on Cogni-tion and Recognition, Mandya, Karnataka, India, 22–23 December 2005, pp. 171–179.
  53. N. K. Abdulaziz, K. K. Pang, Robust data hiding for images, in: Proceedings of IEEE International Conference on Communication Technology, WCC-ICCT'02, vol. 1, 21–25 August 2000, pp. 380–383.
  54. A. A. Abdelwahab, L. A. Hassan, A discrete wavelet transform based technique for image data hiding, in: Proceedings of 25th National Radio Science Conference, NRSC 2008, Egypt, March 18–20, 2008, pp. 1–9.
  55. A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar, A novel technique for image steganography based on DWT and Huffman coding, IJCSS, vol. 4, no. 6, pp. 561-570.
  56. P. Sallee, Model-based steganography, Proc. of the 2nd International Workshop on Digital Water-marking, vol. 2939, pp. 154-167, Springer, 2003.
  57. M. Kharrazi, H. T. Sencar, N. Memon, Performance study of common image steganography and steganalysis techniques, Journal of Electrical Imaging 15 (4) (2006) 1–16.
  58. R. Tzschoppe, R. Baum, J. Huber, A. Kaup, Steganographic system based on higher-order statistics, in: Proceedings of SPIE, Security and Watermarking of Multimedia Contents V. Santa Clara, California, USA 2003, vol. 5020, pp. 156–166.
  59. A. Ker, "Steganalysis of LSB Matching in Grayscale Images. " IEEE Signal Processing Letters, vol. 12(6), pp. 441–444, 2005
  60. J. Spaulding, H. Noda, M. N. Shirazi, E. Kawaguchi, BPCS steganography using EZW lossy compressed images, Pattern Recognition Letters 23 (13) (2002) 1579–1587.
  61. C. C. Chang, H. W. Tseng, A steganographic method for digital images using side match, Pattern Recognition Letters 25 (12) (2004) 1431–1437.
  62. E. Franz, A. Schneidewind, Adaptive steganography based on dithering, in: Proceedings of the ACM Workshop on Multimedia and Security, September 20–21, 2004, Magdeburg, Germany, pp. 56–62.
  63. R. Bohme, A. Westfeld, Breaking cauchy model-based JPEG steganography with first order statistics, in: Proceedings of the European Symposium on Research in Computer Security, ESORICS 2004, Valbonne, France, 13th September 2004, Lecture Notes in Computer Science, vol. 3193, p p. 125–140.
  64. L. Yu, Y. Zhao, R. Ni, Z. Zhu, PM1 steganography in JPEG images using genetic algorithm, Soft Computing 13 (4) (2009) 393–400
  65. C. C. Chang, P. Tsai, M. H. Lin, An adaptive steganography for index- based images using code word grouping, Advances in Multimedia Information Processing-PCM, Springer, vol. 3333, 2004, pp. 731–738.
  66. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun Adaptive data hiding in edge areas of images with spatial LSB do-main systems. IEEE Transactions on Information Forensics and Security, 2008, vol. 3, no. 3, p. 488-497.
  67. Y. H. Yu, C. C. Chang, I. C. Lin, A new steganographic method for color and grayscale image hiding, Computer Vision and Image Under-standing 107 (3) (2007) 183–194.
  68. M. Drew, S. Bergner, Spatio-chromatic de-correlation for color image compression, Technical Report, School of Computing Science, Simon Fraser University, Vancouver, Canada, 2007, available from:/http:// fas. sfu. ca/pub/cs/TR/2007/CMPT2007-09. pdfS.
  69. M. Saenz, R. Oktem, K. Egiazarian, E. Delp, Colour image wavelet compression using vector morphology, in: Proceedings of the European Signal Processing Conference, September 5–8 2000, Tampere, Finland, 2000, pp. 5–8
  70. D. Van Der Weken, M. Nachtegael, E. Kerre, Using similarity measures and homogeneity for the comparison of images, Image and Vision Computing 22 (9) (2004) 695–702.
  71. M. Kutter, F. Petitcolas, A fair benchmark for image watermarking systems, in: Proceedings of Electronic Imaging '99, Security and Watermarking of Multimedia Contents, San Jose, California, USA, 25–27 January 1999, vol. 3657, pp. 226–239
  72. R. Crandall, Some notes on steganography, Posted on steganography mailing list, http://os. inf. tu-dresden. de/ westfeld/crandall. pdf, 1998.
  73. J. Fridrich and D. Soukal, Matrix embedding for large payloads, IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 390-395, 2006.
  74. W. M. Zhang, X. P. Zhang, and S. Z. Wang, A double layered plus-minus one data embedding scheme, IEEE Signal Processing Letters, vol. 14, no. 11, pp. 848-851, 2007.
  75. J. Fridrich, P. Lisonek, and D. Soukal, On steganographic embedding efficiency, Proc. of the 8th Information Hiding Workshop, Springer, no. 4437, pp. 282-296, 2007.
  76. JAurgen Bierbrauer and Jessica Fridrich, Constructing good covering codes for applications in steganography, LNCS Trans. Data Hiding and Multimedia Security III, vol. 4920, pp. 1-22, 2008.
  77. Y. Kim, Z. Duric, and D. Richards, Modified matrix encoding for minimal distortion steganography. Proc. of the 8th Information Hiding Workshop, Springer, vol. 4437, pp. 314-327, 2006.
  78. Jessica Fridrich, Minimizing the embedding impact in steganography, Proc. of the 8th ACM workshop on Multimedia and Security, ACM Press, pp. 2-10, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Digital image steganography spatial domain frequency domain security information hiding.