A Survey on Image Steganography Techniques

被引:0
|
作者
Neole, Bhumika [1 ]
Parlewar, Pallavi [1 ]
Jain, Prerana [2 ]
Samant, Akshita [2 ]
Khire, Vedant [2 ]
Sainani, Radhika [2 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Nagpur, Maharashtra, India
[2] Shri Ramdeobaba Coll Engn & Management, Dept Elect & Commun Engn, Nagpur, Maharashtra, India
来源
关键词
HIDDEN DATA; SECURED COMMUNICATION; IMAGE STEGANOGRAPHY; DISCRETE COSINE TRANSFORM (DCT); DISCRETE WAVELET TRANSFORM (DWT);
D O I
10.21786/bbrc/13.14/85
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Steganography refers to the exchange of hidden data. It deals with the study of invisible communication between the sender and the receiver. In today's modern world transferring secured data over a network is the main concern, hence for secured communication steganography is used. The data that is to be sent is concealed behind a text, image, or an audio file. The attacker or the eavesdropper, who observes the object with embedded data, will not notice it and thus would not try to decrypt the hidden data. Steganography is useful in many areas like efficient confidential communication, protection from data modification, and media database systems. It preserves the confidentiality of the information, which ensures that during communication there will be no alteration in the content of the information. Steganography can be classified into image steganography, audio/video steganography, or text steganography. This paper gives an overview of image steganography and its various techniques to hide the data behind the image. The techniques are discussed and analysed based on their ability to hide the information securely.
引用
收藏
页码:368 / 371
页数:4
相关论文
共 50 条
  • [41] Current status and key issues in image steganography: A survey
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. COMPUTER SCIENCE REVIEW, 2014, 13-14 : 95 - 113
  • [42] Image steganography using contourlet transform and matrix decomposition techniques
    Subhedar, Mansi S.
    Mankar, Vijay H.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22155 - 22181
  • [43] Compressed and raw video steganography techniques: a comprehensive survey and analysis
    Ramadhan J. Mstafa
    Khaled M. Elleithy
    [J]. Multimedia Tools and Applications, 2017, 76 : 21749 - 21786
  • [44] A Comparative Study on Recent Image Steganography Techniques Based on DWT
    Surse, Nishant Madhukar
    Vinayakray-Jani, Preetida
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1308 - 1314
  • [45] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Memon, Nasir
    [J]. TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1, 2006, 4300 : 123 - 137
  • [46] Compressed and raw video steganography techniques: a comprehensive survey and analysis
    Mstafa, Ramadhan J.
    Elleithy, Khaled M.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 21749 - 21786
  • [47] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [48] Quality Evaluation of Image Steganography Techniques: A Heuristics based Approach
    Roy, Ratnakirti
    Changder, Suvamoy
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 179 - 196
  • [49] Image steganography using contourlet transform and matrix decomposition techniques
    Mansi S. Subhedar
    Vijay H. Mankar
    [J]. Multimedia Tools and Applications, 2019, 78 : 22155 - 22181
  • [50] An Optimized Color Image Steganography Using LFSR and DFT Techniques
    Khashandarag, Asghar Shahrzad
    Navin, Ahmad Habibizad
    Mirnia, Mir Kamal
    Mohammad, Hamid Haji Agha
    [J]. ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT II, 2011, 176 (02): : 247 - 253