A Survey on Image Steganography Techniques

被引:0
|
作者
Neole, Bhumika [1 ]
Parlewar, Pallavi [1 ]
Jain, Prerana [2 ]
Samant, Akshita [2 ]
Khire, Vedant [2 ]
Sainani, Radhika [2 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Nagpur, Maharashtra, India
[2] Shri Ramdeobaba Coll Engn & Management, Dept Elect & Commun Engn, Nagpur, Maharashtra, India
来源
关键词
HIDDEN DATA; SECURED COMMUNICATION; IMAGE STEGANOGRAPHY; DISCRETE COSINE TRANSFORM (DCT); DISCRETE WAVELET TRANSFORM (DWT);
D O I
10.21786/bbrc/13.14/85
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Steganography refers to the exchange of hidden data. It deals with the study of invisible communication between the sender and the receiver. In today's modern world transferring secured data over a network is the main concern, hence for secured communication steganography is used. The data that is to be sent is concealed behind a text, image, or an audio file. The attacker or the eavesdropper, who observes the object with embedded data, will not notice it and thus would not try to decrypt the hidden data. Steganography is useful in many areas like efficient confidential communication, protection from data modification, and media database systems. It preserves the confidentiality of the information, which ensures that during communication there will be no alteration in the content of the information. Steganography can be classified into image steganography, audio/video steganography, or text steganography. This paper gives an overview of image steganography and its various techniques to hide the data behind the image. The techniques are discussed and analysed based on their ability to hide the information securely.
引用
收藏
页码:368 / 371
页数:4
相关论文
共 50 条
  • [1] A Literature Survey on various Image Encryption & Steganography Techniques
    Dahiya, Madhu
    Kumar, Raman
    [J]. 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 310 - 314
  • [2] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [3] Comprehensive survey of 3D image steganography techniques
    Girdhar, Ashish
    Kumar, Vijay
    [J]. IET IMAGE PROCESSING, 2018, 12 (01) : 1 - 10
  • [4] A Survey on Image Steganography
    Menon, Nidhi
    Vaithiyanathan
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCEMENTS IN POWER AND ENERGY (TAP ENERGY): EXPLORING ENERGY SOLUTIONS FOR AN INTELLIGENT POWER GRID, 2017,
  • [5] Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research
    Kadhim, Inas Jawad
    Premaratne, Prashan
    Vial, Peter James
    Halloran, Brendan
    [J]. NEUROCOMPUTING, 2019, 335 : 299 - 326
  • [6] Novel and Secure Encoding and Hiding Techniques using Image Steganography: A Survey
    Ashwin, S.
    Kumar, S. Aravind
    Ramesh, J.
    Gunavathi, K.
    [J]. 2012 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ENGINEERING AND ENERGY MANAGEMENT (ICETEEEM - 2012), 2012, : 171 - 177
  • [7] An Introduction to Image Steganography Techniques
    Altaay, Alaa A. Jabbar
    bin Sahib, Shahrin
    Zamani, Mazdak
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 122 - 126
  • [8] A Survey on different techniques of steganography
    Kaur, Harpreet
    Rani, Jyoti
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN ENGINEERING & TECHNOLOGY (ICAET-2016), 2016, 57
  • [9] A Survey on DNA and Image Steganography
    Vinodhini, R. E.
    Malathi, P.
    Kumar, Gireesh T.
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [10] Coverless Image Steganography: A Survey
    Qin, Jiaohua
    Luo, Yuanjing
    Xiang, Xuyu
    Tan, Yun
    Huang, Huajun
    [J]. IEEE ACCESS, 2019, 7 : 171372 - 171394