A Review on Security Techniques in Image Steganography

被引:0
|
作者
Ghoul, Sami [1 ]
Sulaiman, Rossilawati [1 ]
Shukur, Zarina [1 ,2 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi 43600, Malaysia
[2] Univ Zawia, Fac Engn, Dept Comp Syst Engn, Zawia, Libya
关键词
Image steganography; data hiding; steganographic security; randomization; encryption; COLOR IMAGE; LSB; CHAOS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information. Steganography is one of the promising tools for securely exchanging sensitive information through an unsecured medium. It is a powerful tool for protecting a user's data, wherein the user can hide messages inside other media, such as images, videos, and audios (cover media). Image steganography is the science of concealing secret information inside an image using various techniques. The nature of the embedding process makes the hidden information undetectable to human eyes. The challenges faced by image steganography techniques include achieving high embedding capacity, good imperceptibility, and high security. These criteria are inter-related since enhancing one factor undermines one or more others. This paper provides an overview of existing research related to various techniques and security in image steganography. First, basic information in this domain is presented. Next, various kinds of security techniques used in steganography are explained, such as randomization, encryption, and region-based techniques. This paper covers research published from 2017 to 2022. This review is not exhaustive and aims to explore state-of-the-art techniques applied to enhance security, crucial issues in the domain, and future directions to assist new and current researchers.
引用
收藏
页码:361 / 385
页数:25
相关论文
共 50 条
  • [41] Analysis of Image Steganography Techniques in Secure Online Voting
    Rura, Lauretha
    Issac, Biju
    Haldar, Manas Kumar
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 120 - 124
  • [42] Evaluating Image Steganography Techniques: Future Research Challenges
    Roy, Ratnakirti
    Changder, Suvamoy
    Sarkar, Anirban
    Debnath, Narayan C.
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTING, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2013, : 309 - 314
  • [43] Review on lightweight cryptography techniques and steganography techniques for IoT environment
    Supriya, K. Sangeetha
    Lovesum, S. P. Jeno
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (09) : 4210 - 4228
  • [44] Latest Trends in Deep Learning Techniques for Image Steganography
    Kumar, Vijay
    Sharma, Sahil
    Kumar, Chandan
    Sahu, Aditya Kumar
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2023, 15 (01)
  • [45] A Literature Survey on various Image Encryption & Steganography Techniques
    Dahiya, Madhu
    Kumar, Raman
    [J]. 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 310 - 314
  • [46] Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques
    Rani, M. Mary Shanthi
    Mary, G. Germine
    Euphrasia, K. Rosemary
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 403 - 412
  • [47] Security Enhancements for High Quality Image Transaction with Hybrid Image Steganography Algorithm
    Bharti, Shipra
    Behal, Sunny
    Sharma, Vishal
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 162 - 169
  • [48] A Review on Video Steganography Techniques in Spatial Domain
    Disha
    Saini, Khushil
    [J]. 2017 RECENT DEVELOPMENTS IN CONTROL, AUTOMATION AND POWER ENGINEERING (RDCAPE), 2017, : 366 - 371
  • [49] A High Security Approach for Image Steganography by Mapping Pixels to Letters
    Kaur, Sukhpreet
    Kaur, Sumeet
    [J]. INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 280 - +
  • [50] A Novel Image Steganography Method for Industrial Internet of Things Security
    Hassaballah, M.
    Hameed, Mohamed Abdel
    Awad, Ali Ismail
    Muhammad, Khan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) : 7743 - 7751