A Comprehensive Study of Digital Image Steganographic Techniques

被引:5
|
作者
Rahman, Shahid [1 ]
Uddin, Jamal [1 ]
Zakarya, Muhammad [2 ,3 ]
Hussain, Hameed [4 ]
Khan, Ayaz Ali [5 ]
Ahmed, Aftab [2 ]
Haleem, Muhammad [6 ]
机构
[1] Qurtuba Univ Sci & Informat Technol, Dept Comp Sci, Peshawar 29050, Pakistan
[2] Abdul Wali Khan Univ, Dept Comp Sci, Mardan 23200, Pakistan
[3] Sohar Univ, Fac Comp & Informat Technol, Sohar 311, Oman
[4] Univ Buner, Dept Comp Sci, Khyber Pakhtunkhwa 19280, Pakistan
[5] Univ Lakki Marwat, Dept Comp Sci, Khyber Pakhtunkhwa 28420, Pakistan
[6] Kardan Univ, Dept Comp Sci, Kabul 1003, Afghanistan
关键词
Steganography; Cryptography; Security; Media; Watermarking; Robustness; Payloads; Quality assessment; data concealing; cover objects; image quality assessment metrics; HIDING DATA; STEGANALYSIS; TRANSFORMATION; HISTOGRAM; DOMAIN; CRYPTOGRAPHY; ENCRYPTION; TRENDS;
D O I
10.1109/ACCESS.2023.3237393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography surpasses other mechanisms of securing data from potential threats. The modern digital arena calls for robust information hiding techniques and, thus, it has always been a flash point for researchers and academicians. Nowadays, transmission is susceptible to numerous hacks while sharing secret information through typical correspondence channel. Accordingly, everybody needs the classification, respectability, and realness of his or her privileged information. Particularly, different techniques are used to take on these security issues like advanced declaration, computerized mark, and cryptography. Nevertheless, these strategies alone cannot be negotiated. Steganography is a revolution where current information compression, data hypothesis, spread range, and cryptography advancements are integrated to meet the requirements for protection of data over the Internet. This study investigates and critically analyses various existing cover steganography techniques and identifies the valuable region that everyone can be benefited. Moreover, we present a comprehensive overview of the fundamental concepts with in the domain of the steganographic methods and steganalysis. These systems have been depicted in numerous areas of the steganography such as spatial space, transform domain, and adaptive space. Moreover, each space has its particular traits. A few regularly involved techniques for improving the steganographic security and upgrading steganalysis capacity are elaborated, summed up; and conceivable examination patterns are talked about. We also systematically separate different methodologies in our review and show their pros and cons, qualities, challenges and significance.
引用
收藏
页码:6770 / 6791
页数:22
相关论文
共 50 条
  • [1] Digital image forgery: taxonomy, techniques, and tools–a comprehensive study
    B. Chaitra
    P. V. Bhaskar Reddy
    International Journal of System Assurance Engineering and Management, 2023, 14 : 18 - 33
  • [2] A Study on Steganographic Techniques
    Joseph, Princymol
    Vishnukumar, S.
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 206 - 210
  • [3] Digital image forgery: taxonomy, techniques, and tools-a comprehensive study
    Chaitra, B.
    Reddy, P. V. Bhaskar
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (SUPPL 1) : S18 - S33
  • [4] A Comprehensive Survey on Digital Image Watermarking Techniques
    Panchal, Urvi H.
    Srivastava, Rohit
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 591 - 595
  • [5] A Study of Steganographic Image Security
    CHEN Ming-qi directed by YANG Yi-xian
    The Journal of China Universities of Posts and Telecommunications, 2001, (03) : 81 - 82
  • [6] A COMPREHENSIVE STUDY ON DIGITAL IMAGE MATTING
    Yang, Haiyan
    Au, Oscar C.
    Zeng, Jin
    Ji, Mengqi
    Yuan, Yuan
    Jaiswal, Sunil Prasad
    2014 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (CHINASIP), 2014, : 286 - 290
  • [7] Steganographic Techniques of Data Hiding using Digital Images
    Saha, Babloo
    Sharma, Shuchi
    DEFENCE SCIENCE JOURNAL, 2012, 62 (01) : 11 - 18
  • [8] A comprehensive study on image steganography and steganalysis techniques
    Amsaveni, A.
    Vanathi, P.T.
    International Journal of Information and Communication Technology, 2015, 7 (4-5) : 406 - 424
  • [9] Unmasking the digital deception - a comprehensive survey on image forgery and detection techniques
    Bharathiraja, S.
    Kanna, B. Rajesh
    Geetha, S.
    Anusooya, G.
    AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2024, 56 (06) : 635 - 683
  • [10] Comprehensive Display of Digital Image Copy-Move Forensics Techniques
    Waleed, Jumana
    Abdullah, Dhahir Abdulhade
    Khudhur, Mokhles Hussein
    2018 INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND THEIR APPLICATIONS (IICETA), 2018, : 155 - 160