Novel and Secure Encoding and Hiding Techniques using Image Steganography: A Survey

被引:0
|
作者
Ashwin, S. [1 ]
Kumar, S. Aravind [2 ]
Ramesh, J. [3 ]
Gunavathi, K. [3 ]
机构
[1] PSG Coll KOF Technol, Embedded & Real Time Syst, Coimbatore, Tamil Nadu, India
[2] Intel Technol India Pvt Lte, Bangalore, Karnataka, India
[3] PSG Coll Technol, Dept ECE, Coimbatore, Tamil Nadu, India
关键词
Image steganography; steganalysis; spatial domain; transform domain; cryptograph; data hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. The recent growth in computational power and technology has propelled it to the forefront of today's security techniques. This paper presents a review of the literature on different types of contemporary steganography techniques for image in spatial and transform domains and steganalysis techniques for the detection of secret message in the image. In addition, research trends and challenges are identified and directions for future research are discussed.
引用
收藏
页码:171 / 177
页数:7
相关论文
共 50 条
  • [31] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [32] Using steganography techniques for implicit authentication to enhance sensitive data hiding
    Kadhum, Rafal Najeh
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3973 - 3983
  • [33] Novel Ransomware Hiding Model Using HEVC Steganography Approach
    Almomani, Iman
    AlKhayer, Aala
    El-Shafai, Walid
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1209 - 1228
  • [34] Information hiding using steganography
    Amin, MM
    Salleh, M
    Ibrahim, S
    Katmin, MR
    Shamsuddin, MZI
    [J]. 4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, : 21 - 25
  • [35] A Novel Approach of Bulk Data Hiding using Text Steganography
    Shivani
    Yadav, Virendra Kumar
    Batham, Saumya
    [J]. 3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1401 - 1410
  • [36] Comprehensive survey of 3D image steganography techniques
    Girdhar, Ashish
    Kumar, Vijay
    [J]. IET IMAGE PROCESSING, 2018, 12 (01) : 1 - 10
  • [37] Comprehensive survey of 3D image steganography techniques
    Girdhar A.
    Kumar V.
    [J]. Girdhar, Ashish (ashishgirdhar410@gmail.com), 2018, John Wiley and Sons Inc (12) : 1 - 10
  • [38] Image steganography for securing secret data using hybrid hiding model
    Sumeet Kaur
    Savina Bansal
    Rakesh Kumar Bansal
    [J]. Multimedia Tools and Applications, 2021, 80 : 7749 - 7769
  • [39] Randomly Hiding Secret Data using Dynamic Programming for Image Steganography
    Khandelwal, Pulkit
    Bisht, Neha
    Thanikaiselvan, V
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 777 - 783
  • [40] Image steganography for securing secret data using hybrid hiding model
    Kaur, Sumeet
    Bansal, Savina
    Bansal, Rakesh Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) : 7749 - 7769