Evaluating Image Steganography Techniques: Future Research Challenges

被引:0
|
作者
Roy, Ratnakirti [1 ]
Changder, Suvamoy [1 ]
Sarkar, Anirban [1 ]
Debnath, Narayan C. [2 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Durgapur, India
[2] Winona State Univ, Dept Comp Sci, Winona, MN 55987 USA
关键词
Steganography; cover objects; LSB substitution; F5; OPAP; Pixel Indicator Technique;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the art of "concealed writing" and it refers to techniques that hide information inside innocuous looking objects known as "Cover Objects". There are different types of covers available for embedding secret information but images are pervasive in day to day applications and have high redundancy in representation. Thus, they are appealing contenders to be used as cover objects. This paper evaluates the different algorithms for digital image steganography both in the spatial and transform domain like LSB substitution, OPAP, Pixel Indicator Technique, F5 etc. and tries to put light on some possible future research directions in the topic of consideration.
引用
收藏
页码:309 / 314
页数:6
相关论文
共 50 条
  • [31] A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions
    Syed Tufael Nabi
    Munish Kumar
    Paramjeet Singh
    Naveen Aggarwal
    Krishan Kumar
    Multimedia Systems, 2022, 28 : 939 - 992
  • [32] A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions
    Nabi, Syed Tufael
    Kumar, Munish
    Singh, Paramjeet
    Aggarwal, Naveen
    Kumar, Krishan
    MULTIMEDIA SYSTEMS, 2022, 28 (03) : 939 - 992
  • [33] Image steganography using contourlet transform and matrix decomposition techniques
    Subhedar, Mansi S.
    Mankar, Vijay H.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22155 - 22181
  • [34] A Comparative Study on Recent Image Steganography Techniques Based on DWT
    Surse, Nishant Madhukar
    Vinayakray-Jani, Preetida
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1308 - 1314
  • [35] Comprehensive survey of 3D image steganography techniques
    Girdhar, Ashish
    Kumar, Vijay
    IET IMAGE PROCESSING, 2018, 12 (01) : 1 - 10
  • [36] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Memon, Nasir
    TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1, 2006, 4300 : 123 - 137
  • [37] Comprehensive survey of 3D image steganography techniques
    Girdhar A.
    Kumar V.
    Girdhar, Ashish (ashishgirdhar410@gmail.com), 2018, John Wiley and Sons Inc (12) : 1 - 10
  • [38] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [39] Quality Evaluation of Image Steganography Techniques: A Heuristics based Approach
    Roy, Ratnakirti
    Changder, Suvamoy
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 179 - 196
  • [40] An Optimized Color Image Steganography Using LFSR and DFT Techniques
    Khashandarag, Asghar Shahrzad
    Navin, Ahmad Habibizad
    Mirnia, Mir Kamal
    Mohammad, Hamid Haji Agha
    ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT II, 2011, 176 (02): : 247 - 253