A comprehensive study on image steganography and steganalysis techniques

被引:0
|
作者
Amsaveni, A. [1 ]
Vanathi, P.T. [2 ]
机构
[1] Department of ECE, Kumaraguru College of Technology, Coimbatore, Tamil Nadu,641 049, India
[2] Department of ECE, PSG College of Technology, Coimbatore, Tamil Nadu,641 004, India
关键词
Convolutional codes;
D O I
10.1504/IJICT.2015.070300
中图分类号
学科分类号
摘要
In this modern era, computers and the internet are major communication media that connect different parts of the world. The advancement in the field of data communication has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. Hence, information security becomes an inseparable part of data communication. Steganography and steganalysis are important topics in information hiding. Using steganography, information can be hidden in different embedding media, known as carriers. These carriers can be images, audio files, video files, and text files. This paper intends to give an overview of image steganographic techniques. It also attempts to identify the requirements of a good steganographic algorithm. In this paper, steganalysis, which is the science of attacking steganography, has also been discussed. Copyright © 2015 Inderscience Enterprises Ltd.
引用
收藏
页码:406 / 424
相关论文
共 50 条
  • [1] Performance study of common image steganography and steganalysis techniques
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Mernon, Nasir
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [2] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Memon, Nasir
    [J]. TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1, 2006, 4300 : 123 - 137
  • [3] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [4] Image steganography and steganalysis
    Bachrach, Mayra
    Shih, Frank Y.
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03) : 251 - 259
  • [5] Image steganography and steganalysis concepts and practice
    Chandramouli, R
    Kharrazi, M
    Memon, N
    [J]. DIGITAL WATERMARKING, 2004, 2939 : 35 - 49
  • [6] A Comprehensive Study of AI-Based Steganalysis Techniques on Image and Text Documents
    Mehta, Prateek
    Nair, Akshay
    Edappilly, Soumya
    Manik, Khushboo
    Sahu, Sunita
    [J]. ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 53 - 63
  • [7] Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review
    Apau, Richard
    Asante, Michael
    Twum, Frimpong
    Ben Hayfron-Acquah, James
    Peasah, Kwame Ofosuhene
    [J]. PLOS ONE, 2024, 19 (09):
  • [8] Defeating the current steganalysis techniques (robust steganography)
    Sung, AH
    Tadiparthi, GR
    Mukkamala, S
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 440 - 444
  • [9] Steganalysis of Multi Bit Plane Image Steganography
    Barbier, Johann
    Mayoura, Kichenakoumar
    [J]. DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 99 - 111
  • [10] Steganalysis of block-DCT image steganography
    Wang, Y
    Moulin, P
    [J]. PROCEEDINGS OF THE 2003 IEEE WORKSHOP ON STATISTICAL SIGNAL PROCESSING, 2003, : 339 - 342