Steganography and Classification of Image Steganography Techniques

被引:0
|
作者
Kaur, Sumeet [1 ]
Bansal, Savina [1 ]
Bansal, R. K. [1 ]
机构
[1] Punjabi Univ, YCOE, Talwandi Sabo, India
关键词
Confidential; information; Cover Object; Data Security; Stego Object; Steganography; Steganalysis etc;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the cofidential information in a secure way. It is an ongoing research area having vast number of applications in distinct fields such as defense and intelligence, medical, on-line banking, on-line transaction, to stop music piracy and other financial and commercial purposes. There are various steganography approaches exist and they differs depending upon message to be embedded, use of file type as carrier or compression method used etc. The focus of this paper is to classify distinct image steganography techniques besides giving overview, importance and challenges of steganography techniques. Other related security techniques are also been discussed in brief in this paper. The classification of steganography techniques may provide not only understanding and guidelines to researchers in this field but also provide directions for future work in this field.
引用
收藏
页码:870 / 875
页数:6
相关论文
共 50 条
  • [1] An Introduction to Image Steganography Techniques
    Altaay, Alaa A. Jabbar
    bin Sahib, Shahrin
    Zamani, Mazdak
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 122 - 126
  • [2] A Survey on Image Steganography Techniques
    Neole, Bhumika
    Parlewar, Pallavi
    Jain, Prerana
    Samant, Akshita
    Khire, Vedant
    Sainani, Radhika
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 368 - 371
  • [3] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [4] An analysis of LSB Based Image Steganography Techniques
    Thangadurai, K.
    Devi, G. Sudha
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [5] Analysis of LSB based image steganography techniques
    Chandramouli, R
    Memon, N
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1019 - 1022
  • [6] Neural Network Approach to Image Steganography Techniques
    Jarusek, Robert
    Volna, Eva
    Kotyrba, Martin
    [J]. MENDEL 2015: RECENT ADVANCES IN SOFT COMPUTING, 2015, 378 : 317 - 327
  • [7] Analysis of Spatial Domain Image Steganography Techniques
    Shelke, S. G.
    Jagtap, S. K.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 665 - 667
  • [8] Randomization Strategies in Image Steganography Techniques: A Review
    Abadin, A. F. M. Zainul
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 3139 - 3171
  • [9] Review on spatial domain image steganography techniques
    Sirisha, B. Lakshmi
    Mohan, B. Chandra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1873 - 1883
  • [10] Image steganography based on SVD and DWT techniques
    Sirisha, B. Lakshmi
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (03): : 779 - 786