An Introduction to Image Steganography Techniques

被引:34
|
作者
Altaay, Alaa A. Jabbar [1 ,2 ]
bin Sahib, Shahrin [1 ]
Zamani, Mazdak [3 ]
机构
[1] Univ Teknikal Malaysia Melaka, Fac Informat & Commun Technol, Melaka 76100, Malaysia
[2] Al Mustansiriyah Univ, Coll Sci, Baghdad, Iraq
[3] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur 54100, Malaysia
关键词
digital image; information hiding; multimedia security; watermarking; steganography;
D O I
10.1109/ACSAT.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload, and robustness. Different applications have different requirements of the steganography technique used. This paper intends to give an overview of image steganography, its uses and techniques.
引用
收藏
页码:122 / 126
页数:5
相关论文
共 50 条
  • [31] Performance enhanced image steganography systems using transforms and optimization techniques
    S. Uma Maheswari
    D. Jude Hemanth
    [J]. Multimedia Tools and Applications, 2017, 76 : 415 - 436
  • [32] Performance enhanced image steganography systems using transforms and optimization techniques
    Maheswari, S. Uma
    Hemanth, D. Jude
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (01) : 415 - 436
  • [33] Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research
    Kadhim, Inas Jawad
    Premaratne, Prashan
    Vial, Peter James
    Halloran, Brendan
    [J]. NEUROCOMPUTING, 2019, 335 : 299 - 326
  • [34] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques
    Hambouz, Ahmed
    Shaheen, Yousef
    Manna, Abdelrahman
    Al-Fayoumi, Mustafa
    Tedmori, Sara
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
  • [35] Novel and Secure Encoding and Hiding Techniques using Image Steganography: A Survey
    Ashwin, S.
    Kumar, S. Aravind
    Ramesh, J.
    Gunavathi, K.
    [J]. 2012 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ENGINEERING AND ENERGY MANAGEMENT (ICETEEEM - 2012), 2012, : 171 - 177
  • [36] TECHNIQUES AND APPLICATIONS OF IMAGE UNDERSTANDING - INTRODUCTION
    PEARSON, JJ
    [J]. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS, 1981, 281 : R7 - R7
  • [37] FPGA Implementation of Image Steganography using Haar DWT and Modified LSB Techniques
    Simha, Nikhil H. N.
    Prakash, Pradeep M.
    Kashyap, Suraj S.
    Sarkar, Sayantam
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 26 - 31
  • [38] Multi-image steganography and authentication using crypto-stego techniques
    Himani Sharma
    D. C. Mishra
    R. K. Sharma
    Naveen Kumar
    [J]. Multimedia Tools and Applications, 2021, 80 : 29067 - 29093
  • [39] A Novel Secure Image Steganography Using Improved Logistic Map and DNA Techniques
    Sun, Shuliang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (03): : 647 - 652
  • [40] Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review
    Apau, Richard
    Asante, Michael
    Twum, Frimpong
    Ben Hayfron-Acquah, James
    Peasah, Kwame Ofosuhene
    [J]. PLOS ONE, 2024, 19 (09):