Steganography and Classification of Image Steganography Techniques

被引:0
|
作者
Kaur, Sumeet [1 ]
Bansal, Savina [1 ]
Bansal, R. K. [1 ]
机构
[1] Punjabi Univ, YCOE, Talwandi Sabo, India
关键词
Confidential; information; Cover Object; Data Security; Stego Object; Steganography; Steganalysis etc;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the cofidential information in a secure way. It is an ongoing research area having vast number of applications in distinct fields such as defense and intelligence, medical, on-line banking, on-line transaction, to stop music piracy and other financial and commercial purposes. There are various steganography approaches exist and they differs depending upon message to be embedded, use of file type as carrier or compression method used etc. The focus of this paper is to classify distinct image steganography techniques besides giving overview, importance and challenges of steganography techniques. Other related security techniques are also been discussed in brief in this paper. The classification of steganography techniques may provide not only understanding and guidelines to researchers in this field but also provide directions for future work in this field.
引用
收藏
页码:870 / 875
页数:6
相关论文
共 50 条
  • [31] An Optimized Color Image Steganography Using LFSR and DFT Techniques
    Khashandarag, Asghar Shahrzad
    Navin, Ahmad Habibizad
    Mirnia, Mir Kamal
    Mohammad, Hamid Haji Agha
    [J]. ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT II, 2011, 176 (02): : 247 - 253
  • [32] Image Steganography in Spatial Domain: Current Status, Techniques, and Trends
    Alhomoud, Adeeb M.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 27 (01): : 69 - 88
  • [33] An Analysis of Edge Based Image Steganography Techniques in Spatial Domain
    Singla, Deepali
    Juneja, Mamta
    [J]. 2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [34] A Survey on different techniques of steganography
    Kaur, Harpreet
    Rani, Jyoti
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN ENGINEERING & TECHNOLOGY (ICAET-2016), 2016, 57
  • [35] A Review on Text Steganography Techniques
    Majeed, Mohammed Abdul
    Sulaiman, Rossilawati
    Shukur, Zarina
    Hasan, Mohammad Kamrul
    [J]. MATHEMATICS, 2021, 9 (21)
  • [36] A Survey on DNA and Image Steganography
    Vinodhini, R. E.
    Malathi, P.
    Kumar, Gireesh T.
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [37] Image Steganography in Color Conversion
    Li, Qi
    Ma, Bin
    Wang, Xiaoyu
    Wang, Chunpeng
    Gao, Suo
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (01) : 106 - 110
  • [38] Robust Invertible Image Steganography
    Xu, Youmin
    Mou, Chong
    Hu, Yujie
    Xie, Jingfen
    Zhang, Jian
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2022, : 7865 - 7874
  • [39] Modern Methods in Image Steganography
    Banoci, Vladimir
    Bugar, Gabriel
    Levicky, Dusan
    Klenovicova, Zita
    [J]. 12TH INTERNATIONAL CONFERENCE ON RESEARCH IN TELECOMMUNICATION TECHNOLOGIES (RTT 2010), 2010, : 119 - 122
  • [40] Image Processing with Android Steganography
    Bucerzan, Dominic
    Ratiu, Crina
    [J]. SOFT COMPUTING APPLICATIONS, (SOFA 2014), VOL 1, 2016, 356 : 27 - 36