Evaluating Image Steganography Techniques: Future Research Challenges

被引:0
|
作者
Roy, Ratnakirti [1 ]
Changder, Suvamoy [1 ]
Sarkar, Anirban [1 ]
Debnath, Narayan C. [2 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Durgapur, India
[2] Winona State Univ, Dept Comp Sci, Winona, MN 55987 USA
关键词
Steganography; cover objects; LSB substitution; F5; OPAP; Pixel Indicator Technique;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of "concealed writing" and it refers to techniques that hide information inside innocuous looking objects known as "Cover Objects". There are different types of covers available for embedding secret information but images are pervasive in day to day applications and have high redundancy in representation. Thus, they are appealing contenders to be used as cover objects. This paper evaluates the different algorithms for digital image steganography both in the spatial and transform domain like LSB substitution, OPAP, Pixel Indicator Technique, F5 etc. and tries to put light on some possible future research directions in the topic of consideration.
引用
收藏
页码:309 / 314
页数:6
相关论文
共 50 条
  • [21] Performance Evaluation Parameters of Image Steganography Techniques
    Pradhan, Anita
    Sahu, Aditya Kumar
    Swain, Gandharba
    Sekhar, K. Raja
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [22] Comparative Study for Various DNA Based Steganography Techniques with the Essential Conclusions about the Future Research
    Hamed, Ghada
    Marey, Mohammed
    El-Sayed, Safaa Amin
    Tolha, Mohamed Fahmy
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 220 - 225
  • [23] Passive Image Forgery Detection Techniques: A Review, Challenges, and Future Directions
    Kaur, Navneet
    Jindal, Neeru
    Singh, Kulbir
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (03) : 1491 - 1529
  • [24] Passive Image Forgery Detection Techniques: A Review, Challenges, and Future Directions
    Navneet Kaur
    Neeru Jindal
    Kulbir Singh
    Wireless Personal Communications, 2024, 134 : 1491 - 1529
  • [25] Performance study of common image steganography and steganalysis techniques
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Mernon, Nasir
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [26] Analysis of Image Steganography Techniques in Secure Online Voting
    Rura, Lauretha
    Issac, Biju
    Haldar, Manas Kumar
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 120 - 124
  • [27] Latest Trends in Deep Learning Techniques for Image Steganography
    Kumar, Vijay
    Sharma, Sahil
    Kumar, Chandan
    Sahu, Aditya Kumar
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2023, 15 (01)
  • [28] A Literature Survey on various Image Encryption & Steganography Techniques
    Dahiya, Madhu
    Kumar, Raman
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 310 - 314
  • [29] Research on Image Steganography Based on Sudoku Matrix
    Hsiao, Tsung-Chih
    Liu, Dong-Xu
    Chen, Tzer-Long
    Chen, Chih-Cheng
    SYMMETRY-BASEL, 2021, 13 (03): : 1 - 11
  • [30] Adaptive Image Steganography: A Review and Research Directions
    Fadhl, Ayyah Abdulhafith Mahmoud
    Shareif, Hanein Omar Mohamed
    Ali, Malak Ahmed Elsherif
    Elmangoush, Abdullah Mohammad Abdullah
    2024 IEEE 7TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SIGNAL AND IMAGE PROCESSING, ATSIP 2024, 2024, : 494 - 499