An Introduction to Image Steganography Techniques

被引:34
|
作者
Altaay, Alaa A. Jabbar [1 ,2 ]
bin Sahib, Shahrin [1 ]
Zamani, Mazdak [3 ]
机构
[1] Univ Teknikal Malaysia Melaka, Fac Informat & Commun Technol, Melaka 76100, Malaysia
[2] Al Mustansiriyah Univ, Coll Sci, Baghdad, Iraq
[3] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur 54100, Malaysia
关键词
digital image; information hiding; multimedia security; watermarking; steganography;
D O I
10.1109/ACSAT.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload, and robustness. Different applications have different requirements of the steganography technique used. This paper intends to give an overview of image steganography, its uses and techniques.
引用
收藏
页码:122 / 126
页数:5
相关论文
共 50 条
  • [21] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Memon, Nasir
    [J]. TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1, 2006, 4300 : 123 - 137
  • [22] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [23] Image steganography using contourlet transform and matrix decomposition techniques
    Mansi S. Subhedar
    Vijay H. Mankar
    [J]. Multimedia Tools and Applications, 2019, 78 : 22155 - 22181
  • [24] An Optimized Color Image Steganography Using LFSR and DFT Techniques
    Khashandarag, Asghar Shahrzad
    Navin, Ahmad Habibizad
    Mirnia, Mir Kamal
    Mohammad, Hamid Haji Agha
    [J]. ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT II, 2011, 176 (02): : 247 - 253
  • [25] Quality Evaluation of Image Steganography Techniques: A Heuristics based Approach
    Roy, Ratnakirti
    Changder, Suvamoy
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 179 - 196
  • [26] An Analysis of Edge Based Image Steganography Techniques in Spatial Domain
    Singla, Deepali
    Juneja, Mamta
    [J]. 2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [27] Image Steganography in Spatial Domain: Current Status, Techniques, and Trends
    Alhomoud, Adeeb M.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 27 (01): : 69 - 88
  • [28] State-of-the-Art Soft Computing Techniques in Image Steganography Domain
    Hussain, Hanizan Shaker
    Din, Roshidi
    Samad, Hafiza Abdul
    Yaacub, Mohd Hanafizah
    Murad, Roslinda
    Rukhiyah, A.
    Sabdri, Noor Maizatulshima
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST '16), 2016, 1761
  • [29] Comparative performance assessment of deep learning based image steganography techniques
    Varsha Himthani
    Vijaypal Singh Dhaka
    Manjit Kaur
    Geeta Rani
    Meet Oza
    Heung-No Lee
    [J]. Scientific Reports, 12
  • [30] Comparative performance assessment of deep learning based image steganography techniques
    Himthani, Varsha
    Dhaka, Vijaypal Singh
    Kaur, Manjit
    Rani, Geeta
    Oza, Meet
    Lee, Heung-No
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)