A Review on Image Steganography

Authors

  • Sarita T. Sawale  Department of Information Technology, Anuradha Engineering College, Chikhali, Maharashtra, India
  • Shweta J. Patil  Department of Information Technology, Anuradha Engineering College, Chikhali, Maharashtra, India
  • Anju S. Sharma  Department of Information Technology, Anuradha Engineering College, Chikhali, Maharashtra, India

Keywords:

Image, Steganography, Cryptography, Encryption, Data hiding, LSB, DCT, Security.

Abstract

There is a lot of progress in the Internet technology, there was huge text as well as multimedia data internet transfer. With this data, security is vital need. Steganography and cryptography are data security techniques. Cryptography is defined as a method of concealing information by encrypting plain texts to encrypt texts or cipher text and later transferring it to the intended recipient using an unknown key, on the other hand, Steganography provides or says that security raises to a high level; encrypted text by hiding text, image or other formats. Watermark tags and fingerprints are: the other two technologies used in parallel with steganography; in the field of data hiding. Steganography can be integrated to increase the security of encrypted data. These paper present different techniques of image steganography in spatial and frequency domain. LSB modification techniques and DCT coefficients techniques are covered along with its application.

References

  1. Shahzad Alam, S M Zakariya, M Q Rafiq, “Analysis of Modified LSB Approaches of Hiding Information in Digital Images”, 2013 5th International Conference on Computational Intelligence and Communication Networks, @ 2013 IEEE.
  2.  Moerland, T., Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www.liacs.nl /home/ tmoerl/privtech.
  3.  T. Morkel, J.H.P. Eloff, and M.S. Oliver. “An overview of image steganography.” in Proc. ISSA, 2005, pp. 1-11.
  4. L. Chun-Shien. Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. USA: Idea Group Publishing, 2005, pp. 1-253.
  5. R.J. Anderson and F.A.P. Petitcolas. (1998, May). “On the limits of steganography.” IEEE Journal of Selected Area in Communications. [On line]. 16(4), pp. 474-481.
  6.  S. Kurane, H. Harke, and S. Kulkarni, “TEXT AND AUDIO DATA HIDING USING LSB AND DCT A REVIEW APPROACH,” Natl. Conf. “Internet Things To war. a Smart Future. “Recent Trends Electron. Common., 2016.
  7. . E. R. Harold, “What is an Image,” 2006.
  8.  B. N. Chary and B. Sreenivas, “Processing of satellite image using digital image processing,” 2011.
  9.  S. shica and D. K. Gupta, “Various Raster and Vector Image File Formats,” Ijarcce, vol. 4, no. 3, pp. 268–271, 2015acs.nl /home/ tmoerl/privtech.
  10.  Moerland, T., “Lossy and lossless”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf.
  11. Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
  12. . S. Katzenbeisser and F. A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking. Vol.
  13. . P. Wayner, disappearing cryptography: information hiding: steganography & watermarking. Morgan Kaufmann, 2009. 316. Norwood: Artech house, 2000.
  14.  Kamaldeep, Image steganography techniques in spatial domain, their parameters and analytical techniques: a review article, IJAIR, vol.2, no.5, pp.85-92, 2013.
  15.  Wu, C., Tsai, W.H., A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol.24, pp.1613-1626, 2003.
  16.  Kaur, B., Kaur, A., Singh, J., Steganographic approach for hiding Image in DCT domain, International Journal of Advances in Engineering & Technology, July 2011.
  17. Kumar, V. and Kumar, D., Performance evaluation of DWT based image steganography, Advance computing conference (IACC), IEEE 2nd International.2010

Downloads

Published

2020-02-17

Issue

Section

Research Articles

How to Cite

[1]
Sarita T. Sawale, Shweta J. Patil, Anju S. Sharma, " A Review on Image Steganography, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 5, Issue 6, pp.258-266, January-February-2020.