Randomization Strategies in Image Steganography Techniques: A Review

被引:0
|
作者
Abadin, A. F. M. Zainul [1 ,2 ]
Sulaiman, Rossilawati [1 ]
Hasan, Mohammad Kamrul [1 ]
机构
[1] Univ Kebangsaan Malaysia UKM Bangi, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Pabna Univ Sci & Technol, Dept Informat & Commun Engn, Pabna 6600, Bangladesh
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 02期
关键词
Information hiding; image steganography; randomized embedding techniques; payload capacity; imperceptibility; EDGE-DETECTION; HIGH-CAPACITY; SECURE; LSB; COMBINATION; SYSTEM; RSA;
D O I
10.32604/cmc.2024.050834
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image steganography is one of the prominent technologies in data hiding standards. Steganographic system performance mostly depends on the embedding strategy. Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image. The randomization strategies in data embedding techniques may utilize random domains, pixels, or region-of-interest for concealing secrets into a cover image, preventing information from being discovered by an attacker. The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility, but it is challenging. A systematic approach is used with a standard methodology to carry out this study. This review concentrates on the critical examination of several embedding strategies, incorporating experimental results with state-of-the-art methods emphasizing the robustness, security, payload capacity, and visual quality metrics of the stego images. The fundamental ideas of steganography are presented in this work, along with a unique viewpoint that sets it apart from previous works by highlighting research gaps, important problems, and difficulties. Additionally, it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
引用
收藏
页码:3139 / 3171
页数:33
相关论文
共 50 条
  • [1] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [2] Review on spatial domain image steganography techniques
    Sirisha, B. Lakshmi
    Mohan, B. Chandra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1873 - 1883
  • [3] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [4] An Introduction to Image Steganography Techniques
    Altaay, Alaa A. Jabbar
    bin Sahib, Shahrin
    Zamani, Mazdak
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 122 - 126
  • [5] A Survey on Image Steganography Techniques
    Neole, Bhumika
    Parlewar, Pallavi
    Jain, Prerana
    Samant, Akshita
    Khire, Vedant
    Sainani, Radhika
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 368 - 371
  • [6] Spatial Domain Image Steganography based on Security and Randomization
    Tiwari, Namita
    Sandilya, Madhu
    Chawla, Meenu
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 156 - 159
  • [7] A Review on the Strategies and Techniques of image Segmentation
    Bali, Akanksha
    Singh, Shailendra Narayan
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 113 - 120
  • [8] A Review on Text Steganography Techniques
    Majeed, Mohammed Abdul
    Sulaiman, Rossilawati
    Shukur, Zarina
    Hasan, Mohammad Kamrul
    [J]. MATHEMATICS, 2021, 9 (21)
  • [9] Triple-A: Secure RGB Image Steganography Based on Randomization
    Gutub, Adnan
    Al-Qahtani, Ayed
    Tabakh, Abdulaziz
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 400 - 403
  • [10] Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review
    Apau, Richard
    Asante, Michael
    Twum, Frimpong
    Ben Hayfron-Acquah, James
    Peasah, Kwame Ofosuhene
    [J]. PLOS ONE, 2024, 19 (09):