Image Steganography Approaches and Their Detection Strategies: A Survey

被引:0
|
作者
Kombrink, Meike helena [1 ,2 ]
Geradts, Zeno Jean Marius Hubert [1 ,2 ]
Hubert, Marius [2 ]
机构
[1] Netherlands Forens Inst, Digital & Biometr Traces, The Hague, Netherlands
[2] Univ Amsterdam, Informat Inst, Fac Sci, Amsterdam, Netherlands
基金
欧盟地平线“2020”;
关键词
CCS Concepts; Security and privacy -> Information-theoretic techniques; Pseudonymity; anonymity and untraceability; Information flow control; LEAST-SIGNIFICANT-BIT; PARTICLE SWARM OPTIMIZATION; DATA HIDING SCHEME; DIGITAL IMAGES; MODIFICATION DIRECTIONS; ADAPTIVE STEGANOGRAPHY; LEARNING FRAMEWORK; JPEG STEGANALYSIS; LSB STEGANOGRAPHY; EMBEDDING METHOD;
D O I
10.1145/3694965
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of image, video, audio and text files are tweaked to represent the information to hide. This article covers the current methods for hiding information in images, alongside steganalysis methods that aim to detect the presence of steganography. By reviewing 456 references, this article discusses the different approaches that can be taken toward steganography and its much less widely studied counterpart. Currently in research older steganography approaches are more widely used than newer methods even though these show greater potential. New methods do have flaws; therefore, more research is needed to make these practically applicable. For steganalysis one of the greatest challenges is the generalisability. Often one scheme can detect the presence of one specific hiding method. More research is needed to combine current schemes and/or create new generalisable schemes. To allow readers to compare results between different papers in our work, performance indications of all steganalysis methods are outlined and a comparison of performance is included. This comparison is given using 'topological sorting' graphs, which compares detection results from all papers (as stated in the papers themselves) on different steganographic schemes.
引用
收藏
页数:40
相关论文
共 50 条
  • [41] Feature Point Detection in Image Morphing Based Steganography
    Zhao, Qiangfu
    Minakawa, Yutaro
    Liu, Yong
    Yen, Neil Y.
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 2837 - 2842
  • [42] Key Dependent Image Steganography Using Edge Detection
    Alam, Shahzad
    Kumar, Vipin
    Siddiqui, Waseem A.
    Ahmad, Musheer
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 85 - 88
  • [43] Comprehensive survey of 3D image steganography techniques
    Girdhar A.
    Kumar V.
    Girdhar, Ashish (ashishgirdhar410@gmail.com), 2018, John Wiley and Sons Inc (12) : 1 - 10
  • [44] Image steganography based on difference of Gaussians edge detection
    Biswajit Patwari
    Utpal Nandi
    Sudipta Kr Ghosal
    Multimedia Tools and Applications, 2023, 82 : 43759 - 43779
  • [45] BLIND DETECTION FOR IMAGE STEGANOGRAPHY: A SYSTEM FRAMEWORK AND IMPLEMENTATION
    Luo, Xiangyang
    Wang, Daoshun
    Hu, Wei
    Liu, Fenlin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (02): : 433 - 442
  • [46] A Robust Image Steganography Method Resistant to Scaling and Detection
    Zhang, Yue
    Luo, Xiangyang
    Wang, Jinwei
    Yang, Chunfang
    Liu, Fenlin
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 607 - 618
  • [47] Image steganography based on difference of Gaussians edge detection
    Patwari, Biswajit
    Nandi, Utpal
    Ghosal, Sudipta Kr
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (28) : 43759 - 43779
  • [48] Image Steganography Based on Hamming Code and Edge Detection
    Sun, Shuliang
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (05) : 875 - 880
  • [49] Image Steganography Approach Based on Straight Line Detection
    Abdalnour, Yasmina M. A.
    Huwedi, Ashraf Saad
    Bozed, Kenz A.
    2016 17TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA'2016), 2016, : 317 - +
  • [50] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875