An Introduction to Image Steganography Techniques

被引:34
|
作者
Altaay, Alaa A. Jabbar [1 ,2 ]
bin Sahib, Shahrin [1 ]
Zamani, Mazdak [3 ]
机构
[1] Univ Teknikal Malaysia Melaka, Fac Informat & Commun Technol, Melaka 76100, Malaysia
[2] Al Mustansiriyah Univ, Coll Sci, Baghdad, Iraq
[3] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur 54100, Malaysia
关键词
digital image; information hiding; multimedia security; watermarking; steganography;
D O I
10.1109/ACSAT.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload, and robustness. Different applications have different requirements of the steganography technique used. This paper intends to give an overview of image steganography, its uses and techniques.
引用
收藏
页码:122 / 126
页数:5
相关论文
共 50 条
  • [1] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [2] A Survey on Image Steganography Techniques
    Neole, Bhumika
    Parlewar, Pallavi
    Jain, Prerana
    Samant, Akshita
    Khire, Vedant
    Sainani, Radhika
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 368 - 371
  • [3] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [4] Digital Steganography-An Introduction to Techniques and Tools
    Pope, Michael Brian
    Warkentin, Merrill
    Bekkering, Ernst
    Schmidt, Mark B.
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2012, 30
  • [5] An analysis of LSB Based Image Steganography Techniques
    Thangadurai, K.
    Devi, G. Sudha
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [6] Analysis of LSB based image steganography techniques
    Chandramouli, R
    Memon, N
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1019 - 1022
  • [7] Neural Network Approach to Image Steganography Techniques
    Jarusek, Robert
    Volna, Eva
    Kotyrba, Martin
    [J]. MENDEL 2015: RECENT ADVANCES IN SOFT COMPUTING, 2015, 378 : 317 - 327
  • [8] Analysis of Spatial Domain Image Steganography Techniques
    Shelke, S. G.
    Jagtap, S. K.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 665 - 667
  • [9] Randomization Strategies in Image Steganography Techniques: A Review
    Abadin, A. F. M. Zainul
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 3139 - 3171
  • [10] Review on spatial domain image steganography techniques
    Sirisha, B. Lakshmi
    Mohan, B. Chandra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1873 - 1883