Randomization Strategies in Image Steganography Techniques: A Review

被引:0
|
作者
Abadin, A. F. M. Zainul [1 ,2 ]
Sulaiman, Rossilawati [1 ]
Hasan, Mohammad Kamrul [1 ]
机构
[1] Univ Kebangsaan Malaysia UKM Bangi, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Pabna Univ Sci & Technol, Dept Informat & Commun Engn, Pabna 6600, Bangladesh
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 02期
关键词
Information hiding; image steganography; randomized embedding techniques; payload capacity; imperceptibility; EDGE-DETECTION; HIGH-CAPACITY; SECURE; LSB; COMBINATION; SYSTEM; RSA;
D O I
10.32604/cmc.2024.050834
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image steganography is one of the prominent technologies in data hiding standards. Steganographic system performance mostly depends on the embedding strategy. Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image. The randomization strategies in data embedding techniques may utilize random domains, pixels, or region-of-interest for concealing secrets into a cover image, preventing information from being discovered by an attacker. The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility, but it is challenging. A systematic approach is used with a standard methodology to carry out this study. This review concentrates on the critical examination of several embedding strategies, incorporating experimental results with state-of-the-art methods emphasizing the robustness, security, payload capacity, and visual quality metrics of the stego images. The fundamental ideas of steganography are presented in this work, along with a unique viewpoint that sets it apart from previous works by highlighting research gaps, important problems, and difficulties. Additionally, it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
引用
收藏
页码:3139 / 3171
页数:33
相关论文
共 50 条
  • [41] An Optimized Color Image Steganography Using LFSR and DFT Techniques
    Khashandarag, Asghar Shahrzad
    Navin, Ahmad Habibizad
    Mirnia, Mir Kamal
    Mohammad, Hamid Haji Agha
    [J]. ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT II, 2011, 176 (02): : 247 - 253
  • [42] Steganography: A Flexible Embedded Randomization Technique
    Abuhmaidan, Khaled H.
    Kayed, Ahmad K.
    Alrisia, Maryam
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 120 - 144
  • [43] Image Steganography in Spatial Domain: Current Status, Techniques, and Trends
    Alhomoud, Adeeb M.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 27 (01): : 69 - 88
  • [44] An Analysis of Edge Based Image Steganography Techniques in Spatial Domain
    Singla, Deepali
    Juneja, Mamta
    [J]. 2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [45] A Review on the Recent Trends of Image Steganography for VANET Applications
    Ansari, Arshiya S.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 2865 - 2892
  • [46] A Review of Image Steganography Based on Multiple Hashing Algorithm
    Alenizi, Abdullah
    Mohammadi, Mohammad Sajid
    Al-Hajji, Ahmad A.
    Ansari, Arshiya Sajid
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2463 - 2494
  • [47] A Review on Spatial Domain Technique Based on Image Steganography
    Sharma, Neha
    Batra, Usha
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 24 - 27
  • [48] Review on image steganography using different LSB methods
    Sharma, Vijay Kumar
    Soni, Bhanu Pratap
    Janu, Neha
    Aziz, Sadaf
    Shekhawat, Deepika
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1319 - 1329
  • [49] State-of-the-Art Soft Computing Techniques in Image Steganography Domain
    Hussain, Hanizan Shaker
    Din, Roshidi
    Samad, Hafiza Abdul
    Yaacub, Mohd Hanafizah
    Murad, Roslinda
    Rukhiyah, A.
    Sabdri, Noor Maizatulshima
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST '16), 2016, 1761
  • [50] Comparative performance assessment of deep learning based image steganography techniques
    Himthani, Varsha
    Dhaka, Vijaypal Singh
    Kaur, Manjit
    Rani, Geeta
    Oza, Meet
    Lee, Heung-No
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)