Evaluating Image Steganography Techniques: Future Research Challenges

被引:0
|
作者
Roy, Ratnakirti [1 ]
Changder, Suvamoy [1 ]
Sarkar, Anirban [1 ]
Debnath, Narayan C. [2 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Durgapur, India
[2] Winona State Univ, Dept Comp Sci, Winona, MN 55987 USA
关键词
Steganography; cover objects; LSB substitution; F5; OPAP; Pixel Indicator Technique;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of "concealed writing" and it refers to techniques that hide information inside innocuous looking objects known as "Cover Objects". There are different types of covers available for embedding secret information but images are pervasive in day to day applications and have high redundancy in representation. Thus, they are appealing contenders to be used as cover objects. This paper evaluates the different algorithms for digital image steganography both in the spatial and transform domain like LSB substitution, OPAP, Pixel Indicator Technique, F5 etc. and tries to put light on some possible future research directions in the topic of consideration.
引用
收藏
页码:309 / 314
页数:6
相关论文
共 50 条
  • [1] Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research
    Kadhim, Inas Jawad
    Premaratne, Prashan
    Vial, Peter James
    Halloran, Brendan
    [J]. NEUROCOMPUTING, 2019, 335 : 299 - 326
  • [2] Video Steganography Techniques: Taxonomy, Challenges, and Future Directions
    Mstafa, Ramadhan J.
    Elleithy, Khaled M.
    Abdelfattah, Eman
    [J]. 2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [3] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [4] Digital image steganography: challenges, investigation, and recommendation for the future direction
    Abdulla, Alan Anwer
    [J]. SOFT COMPUTING, 2023, 28 (15-16): : 8963 - 8976
  • [5] An Introduction to Image Steganography Techniques
    Altaay, Alaa A. Jabbar
    bin Sahib, Shahrin
    Zamani, Mazdak
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 122 - 126
  • [6] A Survey on Image Steganography Techniques
    Neole, Bhumika
    Parlewar, Pallavi
    Jain, Prerana
    Samant, Akshita
    Khire, Vedant
    Sainani, Radhika
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 368 - 371
  • [7] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [8] A testbed for evaluating security and robustness of steganography techniques
    Al Hawi, T
    Al Qutayri, M
    Barada, H
    [J]. PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 1583 - 1586
  • [9] An Overview and Computer Forensic Challenges in Image Steganography
    Yari, Imrana Abdullahi
    Zargari, Shahrzad
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 360 - 364
  • [10] A comprehensive analysis of image forensics techniques: Challenges and future direction
    Ansari, Mohd D.
    Rashid, Ekbal
    Skandha, S. Siva
    Gupta, Suneet K.
    [J]. Recent Patents on Engineering, 2020, 14 (03) : 458 - 467