A Survey on Image Steganography Techniques

被引:0
|
作者
Neole, Bhumika [1 ]
Parlewar, Pallavi [1 ]
Jain, Prerana [2 ]
Samant, Akshita [2 ]
Khire, Vedant [2 ]
Sainani, Radhika [2 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Nagpur, Maharashtra, India
[2] Shri Ramdeobaba Coll Engn & Management, Dept Elect & Commun Engn, Nagpur, Maharashtra, India
来源
关键词
HIDDEN DATA; SECURED COMMUNICATION; IMAGE STEGANOGRAPHY; DISCRETE COSINE TRANSFORM (DCT); DISCRETE WAVELET TRANSFORM (DWT);
D O I
10.21786/bbrc/13.14/85
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Steganography refers to the exchange of hidden data. It deals with the study of invisible communication between the sender and the receiver. In today's modern world transferring secured data over a network is the main concern, hence for secured communication steganography is used. The data that is to be sent is concealed behind a text, image, or an audio file. The attacker or the eavesdropper, who observes the object with embedded data, will not notice it and thus would not try to decrypt the hidden data. Steganography is useful in many areas like efficient confidential communication, protection from data modification, and media database systems. It preserves the confidentiality of the information, which ensures that during communication there will be no alteration in the content of the information. Steganography can be classified into image steganography, audio/video steganography, or text steganography. This paper gives an overview of image steganography and its various techniques to hide the data behind the image. The techniques are discussed and analysed based on their ability to hide the information securely.
引用
收藏
页码:368 / 371
页数:4
相关论文
共 50 条
  • [21] A comprehensive study on image steganography and steganalysis techniques
    Amsaveni, A.
    Vanathi, P.T.
    [J]. International Journal of Information and Communication Technology, 2015, 7 (4-5) : 406 - 424
  • [22] Analysis of LSB based image steganography techniques
    Chandramouli, R
    Memon, N
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1019 - 1022
  • [23] Neural Network Approach to Image Steganography Techniques
    Jarusek, Robert
    Volna, Eva
    Kotyrba, Martin
    [J]. MENDEL 2015: RECENT ADVANCES IN SOFT COMPUTING, 2015, 378 : 317 - 327
  • [24] Analysis of Spatial Domain Image Steganography Techniques
    Shelke, S. G.
    Jagtap, S. K.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 665 - 667
  • [25] Randomization Strategies in Image Steganography Techniques: A Review
    Abadin, A. F. M. Zainul
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 3139 - 3171
  • [26] Review on spatial domain image steganography techniques
    Sirisha, B. Lakshmi
    Mohan, B. Chandra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1873 - 1883
  • [27] Image steganography based on SVD and DWT techniques
    Sirisha, B. Lakshmi
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (03): : 779 - 786
  • [28] Performance Evaluation Parameters of Image Steganography Techniques
    Pradhan, Anita
    Sahu, Aditya Kumar
    Swain, Gandharba
    Sekhar, K. Raja
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [29] Image Steganography Approaches and Their Detection Strategies: A Survey
    Kombrink, Meike Helena
    Geradts, Zeno Jean Marius Hubert
    Worring, Marcel
    [J]. ACM Computing Surveys, 2024, 57 (02)
  • [30] An extensive literature survey on medical image steganography
    Sarita Gulia
    Saurabh Mukherjee
    Tanupriya Choudhury
    [J]. CSI Transactions on ICT, 2016, 4 (2-4) : 293 - 298