Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Exploring the Techniques of Data Embedding in Images: A Review

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 3
Year of Publication: 2015
Authors:
Amanjot Kaur
Bikrampal Kaur
10.5120/21681-4780

Amanjot Kaur and Bikrampal Kaur. Article: Exploring the Techniques of Data Embedding in Images: A Review. International Journal of Computer Applications 122(3):18-21, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Amanjot Kaur and Bikrampal Kaur},
	title = {Article: Exploring the Techniques of Data Embedding in Images: A Review},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {3},
	pages = {18-21},
	month = {July},
	note = {Full text available}
}

Abstract

Steganography is defined as the invisible communication between two communicating parties. For hiding communicated data many carrier file formats are present but the most commonly used are images. The data can be hidden by using Least Significant Bit(LSB), k-Modulus Method(k-MM), Discrete Wavelet Transform(DWT) and Discrete Cosine Transform(DCT). The LSB and k-MM algorithms are implemented under spatial domain in which secret data is directly embedded in the bits of cover image whereas the DCT and DWT algorithms are under transform domain in which firstly images are transformed and then the message is embedded in the image. The comparison and performance of these techniques depend upon different parameters: MSE(Mean Squared Error), PSNR(Peak Signal to Noise Ratio), BER(Bit Error Rate), Capacity. This paper explains the different Steganography techniques for hiding the information in an image.

References

  • Anderson, R. and Petitcolas, F. 1998. On the limits of steganography, IEEE Journal of Selected Areas in Communications, vol. 16, no. 4, May 1998, pp. 474-481.
  • Morkel, T. , Eloff, J. H. P. , Olivier, M. S. 2005. An overview of image steganography, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa, June 2005 pp. 1-11.
  • Cheddad, A. , Condell, J. , Curran, K. and Kevitt, P. M. 2010. Digital image steganography: survey and analysis of current methods, Signal Processing Elsevier, vol. 90, no. 3, 2010, pp. 727-752.
  • Jassim, F. A. 2013. ??-modulus method for image transformation, International Journal of Advanced Computer Science and Applications, vol. 4, no. 2, 2013, pp. 267–271.
  • Jassim, F. A. and Qassim, H. E. 2012. Five modulus method for image compression, Signal & Image Processing: An International Journal, vol. 3, no. 5, 2012, pp. 19-28.
  • Jassim, F. A. 2013. A Novel Steganography Algorithm to Hide a Grayscale BMP Image in Two Grayscale BMP Images for Dual Secrecy, 2nd National Conference on Information Assurance(NCIA), vol. 4, no. 8, 11 Dec 2013, pp. 73-77.
  • Juneja, M. , Sandhu, P. S. 2009. ,Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption, International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp. 302-305.
  • Krenn. R. 2004. Steganography and Steganalysis, Internet Publication, January 2004. Stuti Goel, Arun Rana, Manpreet Kaur, "A Review of Comparison Techniques of Image Steganography," Global Journal of Computer Science and Technology Graphics & Vision, vol. 13, no. 4, 2013, pp. 9-14.
  • Prabakaran. G, Bhavani. R. 2012. A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform, International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012, pp. 1096-1100.
  • Kumar, V. and Kumar, D. 2010. Performance Evaluation of DWT Based Image Steganography, IEEE 2nd International Advance Computing Conference, 2010, pp. 223-228.
  • Shiva Kumar, K. B. , Raja, K. B. , Chhotaray, R. K. and Pattnaik, S. 2010. Coherent Steganography using Segmentation and DCT, Computational Intelligence and Computing Research(ICCIC), IEEE-978-1-4244-5967-4/10, Dec 2010, pp. 1-6.
  • Ming, C. , Ru, Z. , Xinxin, N. , Yixian, Y. 2010. Analysis of Current Steganography Tools: Classifications & Features, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), IEEE-0-7695-2745-0/06, Dec 2006, pp. 384-387.
  • Beram Fariba Ghorbany. 2014. Effective Parametersof Image Steganography Techniques, International Journal of Computer Applications Technology and Research, vol. 3, no. 6, 2014, pp. 361-363.
  • Suresh Babu, K. , Raja, K. B. , Kiran Kumar K, Manjula Devi T H, Venugopal K R, Patnaik,L. M. 2008. Authentication of Secret Information in Image Steganography, TENCON 2008-2008 IEEE Region 10 Conference, 2008, pp. 1-6.