We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Comparative Study of Steganography Algorithms of Spatial and Transform Domain

Published on January 2016 by Manashee Kalita, Themrichon Tuithung
National Conference on Recent Trends in Information Technology
Foundation of Computer Science USA
NCIT2015 - Number 1
January 2016
Authors: Manashee Kalita, Themrichon Tuithung
1eb2cfbc-66f4-4f8a-a328-7d9c6acae242

Manashee Kalita, Themrichon Tuithung . A Comparative Study of Steganography Algorithms of Spatial and Transform Domain. National Conference on Recent Trends in Information Technology. NCIT2015, 1 (January 2016), 9-14.

@article{
author = { Manashee Kalita, Themrichon Tuithung },
title = { A Comparative Study of Steganography Algorithms of Spatial and Transform Domain },
journal = { National Conference on Recent Trends in Information Technology },
issue_date = { January 2016 },
volume = { NCIT2015 },
number = { 1 },
month = { January },
year = { 2016 },
issn = 0975-8887,
pages = { 9-14 },
numpages = 6,
url = { /proceedings/ncit2015/number1/23744-5194/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Information Technology
%A Manashee Kalita
%A Themrichon Tuithung
%T A Comparative Study of Steganography Algorithms of Spatial and Transform Domain
%J National Conference on Recent Trends in Information Technology
%@ 0975-8887
%V NCIT2015
%N 1
%P 9-14
%D 2016
%I International Journal of Computer Applications
Abstract

Transmitting data from sender to authorized receiver through a public media (insecure media) with full security is a challenging task. From the ancient time, different methods and techniques have been adopted to gain secure transmission of information. With the development of new technologies, the techniques used for securing information have also changed. The three main technology used for securing digital content are watermarking, steganography and cryptography. Watermarking and steganography can be considered under the same roof, i. e. data hiding techniques. In the last decade, steganography has drawn more attention of researchers. This paper presents a comparative study of steganography algorithms both in the spatial and transform domain.

References
  1. Gupta, P. K. , Roy, R. and Changder, S. 3-5 January 2014. A secure image steganography technique with moderately higher significant bit embedding. In Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), pp. 1-6.
  2. Nag, A. , Ghosh, S. , Biswas, S. , Sarkar, D. and Sarkar, P. P. 30-31 March 2012. An image steganography technique using X-box mapping. In Proceedings of the International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 709-713.
  3. Das, R. and Tuithung, T. 30-31 March 2012. A novel steganography method for image based on Huffman Encoding. In Proceedings of the 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14-18.
  4. Kafri, N. and Suleiman, H. Y. 28-31 July 2009. Bit-4 of frequency domain-DCT steganography technique. In Proceedings of the First International Conference on Networked Digital Technologies, 2009. (NDT'09), pp. 286-291.
  5. Prabakaran, G. , Bhavani, R. and Sankaran, S. 6-7 March 2014. Dual Wavelet Transform Used in Color Image Steganography Method. In Proceedings of the International Conference on Intelligent Computing Applications (ICICA), pp. 193-197.
  6. Vijay, M. and Kumar, V. V. 18-20 Dec. 2013. Image steganography algorithm based on Huffman encoding and transform domain method. In proceedings of the Fifth International Conference on Advanced Computing (ICoAC), pp. 517-522.
  7. A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, "Digital image steganography: Survey and analysis of current methods", Journal of Signal Processing, ELSEVIER, volume 90, Issue 3, March, 2010. Pp 727-752.
  8. A. Khan, A. Siddiqa, S. Munib, S. A. Malik, "A recent survey of reversible watermarking techniques", Journal of Information Science, ELSEVIER, vol. 279, Sept. 2014. Pp 251-272.
  9. Singla, D. and Juneja, M. 6-8 March 2014. An analysis of edge based image steganography techniques in spatial domain. In Proceedings of the Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1-5.
  10. Hong-Juan Zhang; Hong-Jun Tang. 19-22 Aug. 2007. A Novel Image Steganography Algorithm Against Statistical Analysis. In Proceedings of the International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3884-3888.
  11. T Morkel, J. H. P Eloff, M. S Olivier. 2005. An overview of image steganography. Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005).
  12. M. S. Subhedar, V. H. Mankar, "Current status and key issues in image steganography: A survey", Journal of Computer Science Review, ELSEVIER, Volumes 13–14, Pages 95–113, November 2014.
  13. Juneja, M. , Sandhu, P. S. 27-28 Oct. 2009. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption. In Proceedings of the International Conference on Advances in Recent Technologies in Communication and Computing, (ARTCom '09), pp. 302-305.
  14. Tayel, M. B. , Sayed Hafez, A. E. -D. and Zied, H. S. 26-28 Nov. 2013. A new hybrid security allocation steganography algorithm. In Proceedings of the 8th International Conference on Computer Engineering & Systems (ICCES), pp. 217-220.
  15. Masud Karim, S. M. ; Rahman, M. S. ; Hossain, M. I. 22-24 Dec. 2011. A new approach for LSB based image steganography using secret key. In Proceedings of the 14th International Conference on Computer and Information Technology (ICCIT), pp. 286-291.
  16. Riasat, R. , Bajwa, I. S. and Ali, M. Z. 11-13 July 2011. A hash-based approach for colour image steganography. In Proceedings of the International Conference on Computer Networks and Information Technology (ICCNIT), pp. 303-307.
  17. W. P. Yang and M. W. Du. August, 1984. A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table. In proceedings of the Tenth International Conference of Very Large Databases, Pp 245-254.
  18. Chaudhary, A. and Vasavada, J. 3-5 Oct. 2012. A hash based approach for secure keyless image steganography in lossless RGB images. In Proceedings of the 4th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 941-944.
  19. Wang Yan and Ling-di Ping. 26-28 Dec. 2009. A New Steganography Algorithm Based on Spatial Domain. In Proceedings of the Second International Symposium on Information Science and Engineering (ISISE), pp. 171-176.
  20. C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution", Journal of Pattern Recognition, Volume 37, Issue 3, March 2004, Pages 469–474, 2004.
  21. Lin-Yu Tseng, Yung-Kuan Chan, Yu-An Ho and Yen-Ping Chu. 26-28 Nov. 2008. Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process. In Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, vol. 3, pp. 320-325.
  22. Bhattacharya, T. , Bhowmik, S. and Chaudhuri, S. R. B. 20-22 Dec. 2008. A Steganographic Approach by Using Session Based Stego-Key, Genetic Algorithm and Variable Bit Replacement Technique. In Proceedings of the International Conference on Computer and Electrical Engineering (ICCEE), pp. 51-55.
  23. Mandal, J. K. and Khamrui, A. 19-21 Dec. 2011. A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD). In Proceedings of the International Symposium on Electronic System Design (ISED), pp. 347-351.
  24. Tayel, M. , Shawky, H. and Hafez, A. E. S. 27-30 Jan. 2013. A hybrid chaos- fuzzy -threshold steganography algorithm for hiding secure data. In Proceedings of the 15th International Conference on Advanced Communication Technology (ICACT), pp. 156-161.
  25. Chiou-Ting Hsu and Ja-Ling Wu. "Hidden digital watermarks in images", In Image Processing, IEEE Transactions on, vol. 8, no. 1, pp. 58-68, Jan 1999.
  26. Tanmay Battacharya, NilanjanDey and Bhadra Chauduri S. R. , "A Session Based Multiple Image Hiding Technique using DWT and DCT", International Journal of Computer Applications, vol. 38(5), 2012. pp. 18-21.
  27. Nilanjan Dey, Anamitra Bardhan Roy, and Sayantan Dey, "A Novel approach of Color Image Hiding using RGB Color planes and DWT", International Journal of Computer Applications, vo1. 36(5), ,2011.
  28. Negrat, K. , Smko, R. and Almarimi, A. 3-5 Oct. 2010. Variable length encoding in multiple frequency domain steganography. In Proceedings of the 2nd International Conference on Software Technology and Engineering (ICSTE), 2010, vol. 1, pp. V1-305-V1-309.
  29. Chin-Chen Chang , Tung-Shou Chen, Lou-Zo Chung, "A steganographic method based upon JPEG and quantization table modification", Journal of Information Science, Volume 141, Issues 1–2, March 2002, Pages 123–138.
  30. Senthooran, V. and Ranathunga, L. 19-20 Aug. 2014. DCT coefficient dependent quantization table modification steganographic algorithm. In Proceedings of the First International Conference on Networks & Soft Computing (ICNSC), pp. 432-436.
  31. Buga?r, G. , Ba?noci, V. , Broda, M. , Levicky?, D. and Dupa?k, D. 15-16 April 2014. Data hiding in still images based on blind algorithm of steganography. In Proceedings of the 24th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 1-4.
  32. Singh, S. and Siddiqui, T. J. 17-19 Dec. 2012. Robust image steganography technique based on redundant discrete wavelet transform. In Proceedings of the 2nd International Conference on Power, Control and Embedded Systems (ICPCES), pp. 1-4.
  33. Fowler, J. E. , "The Redundant Discrete Wavelet Transform and Additive Noise," in Signal Processing Letters, IEEE, vol. 12, no. 9, pp. 629-632, Sept. 2005.
  34. Raftari, N. and Moghadam, A. M. E. 24-26 July 2012. Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT. In Proceedings of the Fourth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 295-300.
  35. Abdelwahab, A. A. and Hassaan, L. A. 18-20 March 2008. A discrete wavelet transform based technique for image data hiding. In Proceedings of the National Radio Science Conference (NRSC), pp. 1-9.
  36. A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar, "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding", International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6), pp. 497-610, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Stego Image Cover Image Spatial Domain Transform Domain.