A Review on Image Steganography
Keywords:
Image, Steganography, Cryptography, Encryption, Data hiding, LSB, DCT, Security.Abstract
There is a lot of progress in the Internet technology, there was huge text as well as multimedia data internet transfer. With this data, security is vital need. Steganography and cryptography are data security techniques. Cryptography is defined as a method of concealing information by encrypting plain texts to encrypt texts or cipher text and later transferring it to the intended recipient using an unknown key, on the other hand, Steganography provides or says that security raises to a high level; encrypted text by hiding text, image or other formats. Watermark tags and fingerprints are: the other two technologies used in parallel with steganography; in the field of data hiding. Steganography can be integrated to increase the security of encrypted data. These paper present different techniques of image steganography in spatial and frequency domain. LSB modification techniques and DCT coefficients techniques are covered along with its application.
References
- Shahzad Alam, S M Zakariya, M Q Rafiq, “Analysis of Modified LSB Approaches of Hiding Information in Digital Images”, 2013 5th International Conference on Computational Intelligence and Communication Networks, @ 2013 IEEE.
- Moerland, T., Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www.liacs.nl /home/ tmoerl/privtech.
- T. Morkel, J.H.P. Eloff, and M.S. Oliver. “An overview of image steganography.” in Proc. ISSA, 2005, pp. 1-11.
- L. Chun-Shien. Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. USA: Idea Group Publishing, 2005, pp. 1-253.
- R.J. Anderson and F.A.P. Petitcolas. (1998, May). “On the limits of steganography.” IEEE Journal of Selected Area in Communications. [On line]. 16(4), pp. 474-481.
- S. Kurane, H. Harke, and S. Kulkarni, “TEXT AND AUDIO DATA HIDING USING LSB AND DCT A REVIEW APPROACH,” Natl. Conf. “Internet Things To war. a Smart Future. “Recent Trends Electron. Common., 2016.
- . E. R. Harold, “What is an Image,” 2006.
- B. N. Chary and B. Sreenivas, “Processing of satellite image using digital image processing,” 2011.
- S. shica and D. K. Gupta, “Various Raster and Vector Image File Formats,” Ijarcce, vol. 4, no. 3, pp. 268–271, 2015acs.nl /home/ tmoerl/privtech.
- Moerland, T., “Lossy and lossless”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf.
- Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
- . S. Katzenbeisser and F. A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking. Vol.
- . P. Wayner, disappearing cryptography: information hiding: steganography & watermarking. Morgan Kaufmann, 2009. 316. Norwood: Artech house, 2000.
- Kamaldeep, Image steganography techniques in spatial domain, their parameters and analytical techniques: a review article, IJAIR, vol.2, no.5, pp.85-92, 2013.
- Wu, C., Tsai, W.H., A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol.24, pp.1613-1626, 2003.
- Kaur, B., Kaur, A., Singh, J., Steganographic approach for hiding Image in DCT domain, International Journal of Advances in Engineering & Technology, July 2011.
- Kumar, V. and Kumar, D., Performance evaluation of DWT based image steganography, Advance computing conference (IACC), IEEE 2nd International.2010
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.