A Review on Security Techniques in Image Steganography

被引:0
|
作者
Ghoul, Sami [1 ]
Sulaiman, Rossilawati [1 ]
Shukur, Zarina [1 ,2 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi 43600, Malaysia
[2] Univ Zawia, Fac Engn, Dept Comp Syst Engn, Zawia, Libya
关键词
Image steganography; data hiding; steganographic security; randomization; encryption; COLOR IMAGE; LSB; CHAOS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information. Steganography is one of the promising tools for securely exchanging sensitive information through an unsecured medium. It is a powerful tool for protecting a user's data, wherein the user can hide messages inside other media, such as images, videos, and audios (cover media). Image steganography is the science of concealing secret information inside an image using various techniques. The nature of the embedding process makes the hidden information undetectable to human eyes. The challenges faced by image steganography techniques include achieving high embedding capacity, good imperceptibility, and high security. These criteria are inter-related since enhancing one factor undermines one or more others. This paper provides an overview of existing research related to various techniques and security in image steganography. First, basic information in this domain is presented. Next, various kinds of security techniques used in steganography are explained, such as randomization, encryption, and region-based techniques. This paper covers research published from 2017 to 2022. This review is not exhaustive and aims to explore state-of-the-art techniques applied to enhance security, crucial issues in the domain, and future directions to assist new and current researchers.
引用
收藏
页码:361 / 385
页数:25
相关论文
共 50 条
  • [1] Randomization Strategies in Image Steganography Techniques: A Review
    Abadin, A. F. M. Zainul
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 3139 - 3171
  • [2] Review on spatial domain image steganography techniques
    Sirisha, B. Lakshmi
    Mohan, B. Chandra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1873 - 1883
  • [3] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [4] An Introduction to Image Steganography Techniques
    Altaay, Alaa A. Jabbar
    bin Sahib, Shahrin
    Zamani, Mazdak
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 122 - 126
  • [5] A Survey on Image Steganography Techniques
    Neole, Bhumika
    Parlewar, Pallavi
    Jain, Prerana
    Samant, Akshita
    Khire, Vedant
    Sainani, Radhika
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 368 - 371
  • [6] Multiple Security Enhancements for Image Steganography
    Mohan, Megha
    Sandeep, Anitha
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 298 - 302
  • [7] Digital watermarking techniques for image security: a review
    A. Mohanarathinam
    S. Kamalraj
    G. K. D. Prasanna Venkatesan
    Renjith V. Ravi
    C. S. Manikandababu
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3221 - 3229
  • [8] Digital watermarking techniques for image security: a review
    Mohanarathinam, A.
    Kamalraj, S.
    Prasanna Venkatesan, G. K. D.
    Ravi, Renjith V.
    Manikandababu, C. S.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (08) : 3221 - 3229
  • [9] Enhanced the Security of Image Steganography Through Image Encryption
    Bhardwaja, Rupali
    Khanna, Divya
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [10] Security analysis of DNA based steganography techniques
    Al-Harbi, Omnia Abdullah
    Alahmadi, Walaa Essa
    Aljahdali, Asia Othman
    [J]. SN APPLIED SCIENCES, 2020, 2 (02):