Randomization Strategies in Image Steganography Techniques: A Review

被引:0
|
作者
Abadin, A. F. M. Zainul [1 ,2 ]
Sulaiman, Rossilawati [1 ]
Hasan, Mohammad Kamrul [1 ]
机构
[1] Univ Kebangsaan Malaysia UKM Bangi, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Pabna Univ Sci & Technol, Dept Informat & Commun Engn, Pabna 6600, Bangladesh
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 02期
关键词
Information hiding; image steganography; randomized embedding techniques; payload capacity; imperceptibility; EDGE-DETECTION; HIGH-CAPACITY; SECURE; LSB; COMBINATION; SYSTEM; RSA;
D O I
10.32604/cmc.2024.050834
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image steganography is one of the prominent technologies in data hiding standards. Steganographic system performance mostly depends on the embedding strategy. Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image. The randomization strategies in data embedding techniques may utilize random domains, pixels, or region-of-interest for concealing secrets into a cover image, preventing information from being discovered by an attacker. The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility, but it is challenging. A systematic approach is used with a standard methodology to carry out this study. This review concentrates on the critical examination of several embedding strategies, incorporating experimental results with state-of-the-art methods emphasizing the robustness, security, payload capacity, and visual quality metrics of the stego images. The fundamental ideas of steganography are presented in this work, along with a unique viewpoint that sets it apart from previous works by highlighting research gaps, important problems, and difficulties. Additionally, it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
引用
收藏
页码:3139 / 3171
页数:33
相关论文
共 50 条
  • [31] Image steganography using contourlet transform and matrix decomposition techniques
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22155 - 22181
  • [32] A Comparative Study on Recent Image Steganography Techniques Based on DWT
    Surse, Nishant Madhukar
    Vinayakray-Jani, Preetida
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1308 - 1314
  • [33] Comprehensive survey of 3D image steganography techniques
    Girdhar, Ashish
    Kumar, Vijay
    [J]. IET IMAGE PROCESSING, 2018, 12 (01) : 1 - 10
  • [34] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Memon, Nasir
    [J]. TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1, 2006, 4300 : 123 - 137
  • [35] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [36] Quality Evaluation of Image Steganography Techniques: A Heuristics based Approach
    Roy, Ratnakirti
    Changder, Suvamoy
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 179 - 196
  • [37] Image steganography using contourlet transform and matrix decomposition techniques
    Mansi S. Subhedar
    Vijay H. Mankar
    [J]. Multimedia Tools and Applications, 2019, 78 : 22155 - 22181
  • [38] An Optimized Color Image Steganography Using LFSR and DFT Techniques
    Khashandarag, Asghar Shahrzad
    Navin, Ahmad Habibizad
    Mirnia, Mir Kamal
    Mohammad, Hamid Haji Agha
    [J]. ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT II, 2011, 176 (02): : 247 - 253
  • [39] Image Steganography in Spatial Domain: Current Status, Techniques, and Trends
    Alhomoud, Adeeb M.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 27 (01): : 69 - 88
  • [40] An Analysis of Edge Based Image Steganography Techniques in Spatial Domain
    Singla, Deepali
    Juneja, Mamta
    [J]. 2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,