A Review on Security Techniques in Image Steganography

被引:0
|
作者
Ghoul, Sami [1 ]
Sulaiman, Rossilawati [1 ]
Shukur, Zarina [1 ,2 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi 43600, Malaysia
[2] Univ Zawia, Fac Engn, Dept Comp Syst Engn, Zawia, Libya
关键词
Image steganography; data hiding; steganographic security; randomization; encryption; COLOR IMAGE; LSB; CHAOS;
D O I
10.14569/IJACSA.2023.0140640
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information. Steganography is one of the promising tools for securely exchanging sensitive information through an unsecured medium. It is a powerful tool for protecting a user's data, wherein the user can hide messages inside other media, such as images, videos, and audios (cover media). Image steganography is the science of concealing secret information inside an image using various techniques. The nature of the embedding process makes the hidden information undetectable to human eyes. The challenges faced by image steganography techniques include achieving high embedding capacity, good imperceptibility, and high security. These criteria are inter-related since enhancing one factor undermines one or more others. This paper provides an overview of existing research related to various techniques and security in image steganography. First, basic information in this domain is presented. Next, various kinds of security techniques used in steganography are explained, such as randomization, encryption, and region-based techniques. This paper covers research published from 2017 to 2022. This review is not exhaustive and aims to explore state-of-the-art techniques applied to enhance security, crucial issues in the domain, and future directions to assist new and current researchers.
引用
收藏
页码:361 / 385
页数:25
相关论文
共 50 条
  • [21] An analysis of LSB Based Image Steganography Techniques
    Thangadurai, K.
    Devi, G. Sudha
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [22] A comprehensive study on image steganography and steganalysis techniques
    Amsaveni, A.
    Vanathi, P.T.
    [J]. International Journal of Information and Communication Technology, 2015, 7 (4-5) : 406 - 424
  • [23] Analysis of LSB based image steganography techniques
    Chandramouli, R
    Memon, N
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1019 - 1022
  • [24] Neural Network Approach to Image Steganography Techniques
    Jarusek, Robert
    Volna, Eva
    Kotyrba, Martin
    [J]. MENDEL 2015: RECENT ADVANCES IN SOFT COMPUTING, 2015, 378 : 317 - 327
  • [25] Analysis of Spatial Domain Image Steganography Techniques
    Shelke, S. G.
    Jagtap, S. K.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 665 - 667
  • [26] Image steganography based on SVD and DWT techniques
    Sirisha, B. Lakshmi
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (03): : 779 - 786
  • [27] Performance Evaluation Parameters of Image Steganography Techniques
    Pradhan, Anita
    Sahu, Aditya Kumar
    Swain, Gandharba
    Sekhar, K. Raja
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [28] Analysis of various data security techniques of steganography: A survey
    Dhawan, Sachin
    Gupta, Rashmi
    [J]. INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 63 - 87
  • [29] Improved Security Based on Combined Encryption and Steganography Techniques
    Mocanu, Stefan
    Duluta, Andrei
    Merezeanu, Daniel
    Pietraru, Radu
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2017, 26 (01): : 115 - 126
  • [30] Review On Cryptography and Steganography Techniques in Video
    Aiswarya, S.
    Gomathi, R.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 30 - 33