Steganography and Classification of Image Steganography Techniques

被引:0
|
作者
Kaur, Sumeet [1 ]
Bansal, Savina [1 ]
Bansal, R. K. [1 ]
机构
[1] Punjabi Univ, YCOE, Talwandi Sabo, India
关键词
Confidential; information; Cover Object; Data Security; Stego Object; Steganography; Steganalysis etc;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the cofidential information in a secure way. It is an ongoing research area having vast number of applications in distinct fields such as defense and intelligence, medical, on-line banking, on-line transaction, to stop music piracy and other financial and commercial purposes. There are various steganography approaches exist and they differs depending upon message to be embedded, use of file type as carrier or compression method used etc. The focus of this paper is to classify distinct image steganography techniques besides giving overview, importance and challenges of steganography techniques. Other related security techniques are also been discussed in brief in this paper. The classification of steganography techniques may provide not only understanding and guidelines to researchers in this field but also provide directions for future work in this field.
引用
收藏
页码:870 / 875
页数:6
相关论文
共 50 条
  • [21] A Survey on Image Steganography
    Menon, Nidhi
    Vaithiyanathan
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCEMENTS IN POWER AND ENERGY (TAP ENERGY): EXPLORING ENERGY SOLUTIONS FOR AN INTELLIGENT POWER GRID, 2017,
  • [22] Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography
    Sharifzadeh, Mehdi
    Aloraini, Mohammed
    Schonfeld, Dan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 867 - 879
  • [23] Lossless image steganography: Regard steganography as super-resolution
    Wang, Tingqiang
    Cheng, Hang
    Liu, Ximeng
    Xu, Yongliang
    Chen, Fei
    Wang, Meiqing
    Chen, Jiaoling
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2024, 61 (04)
  • [24] Image steganography using contourlet transform and matrix decomposition techniques
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22155 - 22181
  • [25] A Comparative Study on Recent Image Steganography Techniques Based on DWT
    Surse, Nishant Madhukar
    Vinayakray-Jani, Preetida
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1308 - 1314
  • [26] Comprehensive survey of 3D image steganography techniques
    Girdhar, Ashish
    Kumar, Vijay
    [J]. IET IMAGE PROCESSING, 2018, 12 (01) : 1 - 10
  • [27] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Memon, Nasir
    [J]. TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1, 2006, 4300 : 123 - 137
  • [28] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [29] Quality Evaluation of Image Steganography Techniques: A Heuristics based Approach
    Roy, Ratnakirti
    Changder, Suvamoy
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 179 - 196
  • [30] Image steganography using contourlet transform and matrix decomposition techniques
    Mansi S. Subhedar
    Vijay H. Mankar
    [J]. Multimedia Tools and Applications, 2019, 78 : 22155 - 22181