A Survey on Image Steganography Techniques

被引:0
|
作者
Neole, Bhumika [1 ]
Parlewar, Pallavi [1 ]
Jain, Prerana [2 ]
Samant, Akshita [2 ]
Khire, Vedant [2 ]
Sainani, Radhika [2 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Nagpur, Maharashtra, India
[2] Shri Ramdeobaba Coll Engn & Management, Dept Elect & Commun Engn, Nagpur, Maharashtra, India
来源
关键词
HIDDEN DATA; SECURED COMMUNICATION; IMAGE STEGANOGRAPHY; DISCRETE COSINE TRANSFORM (DCT); DISCRETE WAVELET TRANSFORM (DWT);
D O I
10.21786/bbrc/13.14/85
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Steganography refers to the exchange of hidden data. It deals with the study of invisible communication between the sender and the receiver. In today's modern world transferring secured data over a network is the main concern, hence for secured communication steganography is used. The data that is to be sent is concealed behind a text, image, or an audio file. The attacker or the eavesdropper, who observes the object with embedded data, will not notice it and thus would not try to decrypt the hidden data. Steganography is useful in many areas like efficient confidential communication, protection from data modification, and media database systems. It preserves the confidentiality of the information, which ensures that during communication there will be no alteration in the content of the information. Steganography can be classified into image steganography, audio/video steganography, or text steganography. This paper gives an overview of image steganography and its various techniques to hide the data behind the image. The techniques are discussed and analysed based on their ability to hide the information securely.
引用
收藏
页码:368 / 371
页数:4
相关论文
共 50 条
  • [41] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [42] Quantum Image Steganography Schemes for Data Hiding: A Survey
    Min-Allah, Nasro
    Nagy, Naya
    Aljabri, Malak
    Alkharraa, Mariam
    Alqahtani, Mashael
    Alghamdi, Dana
    Sabri, Razan
    Alshaikh, Rana
    APPLIED SCIENCES-BASEL, 2022, 12 (20):
  • [43] Learning-based image steganography and watermarking: A survey
    Hu, Kun
    Wang, Mingpei
    Ma, Xiaohui
    Chen, Jia
    Wang, Xiaochao
    Wang, Xingjun
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [44] A survey on Deep-Learning-based image steganography
    Song, Bingbing
    Wei, Ping
    Wu, Sixing
    Lin, Yu
    Zhou, Wei
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 254
  • [45] A Survey on Cloud Data Security using Image Steganography
    Albalawi, Afrah
    Hamza, Nermin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 645 - 649
  • [46] Current status and key issues in image steganography: A survey
    Subhedar, Mansi S.
    Mankar, Vijay H.
    COMPUTER SCIENCE REVIEW, 2014, 13-14 (0C) : 95 - 113
  • [47] A Survey on Steganography Techniques in Real Time Audio Signals and Evaluation
    Al-Othmani, Abdulaleem Z.
    Manaf, Azizah Abdul
    Zeki, Akram M.
    International Journal of Computer Science Issues, 2012, 9 (1 1-1): : 30 - 37
  • [48] Image steganography using contourlet transform and matrix decomposition techniques
    Subhedar, Mansi S.
    Mankar, Vijay H.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22155 - 22181
  • [49] Compressed and raw video steganography techniques: a comprehensive survey and analysis
    Ramadhan J. Mstafa
    Khaled M. Elleithy
    Multimedia Tools and Applications, 2017, 76 : 21749 - 21786
  • [50] A Comparative Study on Recent Image Steganography Techniques Based on DWT
    Surse, Nishant Madhukar
    Vinayakray-Jani, Preetida
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1308 - 1314