A Survey on Image Steganography Techniques

被引:0
|
作者
Neole, Bhumika [1 ]
Parlewar, Pallavi [1 ]
Jain, Prerana [2 ]
Samant, Akshita [2 ]
Khire, Vedant [2 ]
Sainani, Radhika [2 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Nagpur, Maharashtra, India
[2] Shri Ramdeobaba Coll Engn & Management, Dept Elect & Commun Engn, Nagpur, Maharashtra, India
来源
关键词
HIDDEN DATA; SECURED COMMUNICATION; IMAGE STEGANOGRAPHY; DISCRETE COSINE TRANSFORM (DCT); DISCRETE WAVELET TRANSFORM (DWT);
D O I
10.21786/bbrc/13.14/85
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Steganography refers to the exchange of hidden data. It deals with the study of invisible communication between the sender and the receiver. In today's modern world transferring secured data over a network is the main concern, hence for secured communication steganography is used. The data that is to be sent is concealed behind a text, image, or an audio file. The attacker or the eavesdropper, who observes the object with embedded data, will not notice it and thus would not try to decrypt the hidden data. Steganography is useful in many areas like efficient confidential communication, protection from data modification, and media database systems. It preserves the confidentiality of the information, which ensures that during communication there will be no alteration in the content of the information. Steganography can be classified into image steganography, audio/video steganography, or text steganography. This paper gives an overview of image steganography and its various techniques to hide the data behind the image. The techniques are discussed and analysed based on their ability to hide the information securely.
引用
收藏
页码:368 / 371
页数:4
相关论文
共 50 条
  • [31] Image Steganography Approaches and Their Detection Strategies: A Survey
    Kombrink, Meike helena
    Geradts, Zeno Jean Marius Hubert
    Hubert, Marius
    ACM COMPUTING SURVEYS, 2025, 57 (02)
  • [32] A Comprehensive Survey of Digital Image Steganography and Steganalysis
    Luo, Weiqi
    Wei, Kangkang
    Li, Qiushi
    Ye, Miaoxin
    Tan, Shunquan
    Tang, Weixuan
    Huang, Jiwu
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2024, 13 (01)
  • [33] An extensive literature survey on medical image steganography
    Sarita Gulia
    Saurabh Mukherjee
    Tanupriya Choudhury
    CSI Transactions on ICT, 2016, 4 (2-4) : 293 - 298
  • [34] Survey on Steganography Methods (Text, Image, Audio, Video, Protocol and Network Steganography)
    PrashantJohri
    Mishra, Amba
    Das, Sanjoy
    Kumar, Arun
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2906 - 2909
  • [35] Comprehensive survey of 3D image steganography techniques (vol 12, pg 1, 2018)
    Girdhar, A.
    Kumar, V
    IET IMAGE PROCESSING, 2018, 12 (04) : 619 - 619
  • [36] Analysis of various data security techniques of steganography: A survey
    Dhawan, Sachin
    Gupta, Rashmi
    INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 63 - 87
  • [37] Performance study of common image steganography and steganalysis techniques
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Mernon, Nasir
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [38] Evaluating Image Steganography Techniques: Future Research Challenges
    Roy, Ratnakirti
    Changder, Suvamoy
    Sarkar, Anirban
    Debnath, Narayan C.
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2013, : 309 - 314
  • [39] Analysis of Image Steganography Techniques in Secure Online Voting
    Rura, Lauretha
    Issac, Biju
    Haldar, Manas Kumar
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 120 - 124
  • [40] Latest Trends in Deep Learning Techniques for Image Steganography
    Kumar, Vijay
    Sharma, Sahil
    Kumar, Chandan
    Sahu, Aditya Kumar
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2023, 15 (01)