CFP last date
22 April 2024
Reseach Article

Exploring the Techniques of Data Embedding in Images: A Review

by Amanjot Kaur, Bikrampal Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 3
Year of Publication: 2015
Authors: Amanjot Kaur, Bikrampal Kaur
10.5120/21681-4780

Amanjot Kaur, Bikrampal Kaur . Exploring the Techniques of Data Embedding in Images: A Review. International Journal of Computer Applications. 122, 3 ( July 2015), 18-21. DOI=10.5120/21681-4780

@article{ 10.5120/21681-4780,
author = { Amanjot Kaur, Bikrampal Kaur },
title = { Exploring the Techniques of Data Embedding in Images: A Review },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 3 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number3/21681-4780/ },
doi = { 10.5120/21681-4780 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:37.390072+05:30
%A Amanjot Kaur
%A Bikrampal Kaur
%T Exploring the Techniques of Data Embedding in Images: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 3
%P 18-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is defined as the invisible communication between two communicating parties. For hiding communicated data many carrier file formats are present but the most commonly used are images. The data can be hidden by using Least Significant Bit(LSB), k-Modulus Method(k-MM), Discrete Wavelet Transform(DWT) and Discrete Cosine Transform(DCT). The LSB and k-MM algorithms are implemented under spatial domain in which secret data is directly embedded in the bits of cover image whereas the DCT and DWT algorithms are under transform domain in which firstly images are transformed and then the message is embedded in the image. The comparison and performance of these techniques depend upon different parameters: MSE(Mean Squared Error), PSNR(Peak Signal to Noise Ratio), BER(Bit Error Rate), Capacity. This paper explains the different Steganography techniques for hiding the information in an image.

References
  1. Anderson, R. and Petitcolas, F. 1998. On the limits of steganography, IEEE Journal of Selected Areas in Communications, vol. 16, no. 4, May 1998, pp. 474-481.
  2. Morkel, T. , Eloff, J. H. P. , Olivier, M. S. 2005. An overview of image steganography, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa, June 2005 pp. 1-11.
  3. Cheddad, A. , Condell, J. , Curran, K. and Kevitt, P. M. 2010. Digital image steganography: survey and analysis of current methods, Signal Processing Elsevier, vol. 90, no. 3, 2010, pp. 727-752.
  4. Jassim, F. A. 2013. ??-modulus method for image transformation, International Journal of Advanced Computer Science and Applications, vol. 4, no. 2, 2013, pp. 267–271.
  5. Jassim, F. A. and Qassim, H. E. 2012. Five modulus method for image compression, Signal & Image Processing: An International Journal, vol. 3, no. 5, 2012, pp. 19-28.
  6. Jassim, F. A. 2013. A Novel Steganography Algorithm to Hide a Grayscale BMP Image in Two Grayscale BMP Images for Dual Secrecy, 2nd National Conference on Information Assurance(NCIA), vol. 4, no. 8, 11 Dec 2013, pp. 73-77.
  7. Juneja, M. , Sandhu, P. S. 2009. ,Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption, International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp. 302-305.
  8. Krenn. R. 2004. Steganography and Steganalysis, Internet Publication, January 2004. Stuti Goel, Arun Rana, Manpreet Kaur, "A Review of Comparison Techniques of Image Steganography," Global Journal of Computer Science and Technology Graphics & Vision, vol. 13, no. 4, 2013, pp. 9-14.
  9. Prabakaran. G, Bhavani. R. 2012. A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform, International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012, pp. 1096-1100.
  10. Kumar, V. and Kumar, D. 2010. Performance Evaluation of DWT Based Image Steganography, IEEE 2nd International Advance Computing Conference, 2010, pp. 223-228.
  11. Shiva Kumar, K. B. , Raja, K. B. , Chhotaray, R. K. and Pattnaik, S. 2010. Coherent Steganography using Segmentation and DCT, Computational Intelligence and Computing Research(ICCIC), IEEE-978-1-4244-5967-4/10, Dec 2010, pp. 1-6.
  12. Ming, C. , Ru, Z. , Xinxin, N. , Yixian, Y. 2010. Analysis of Current Steganography Tools: Classifications & Features, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), IEEE-0-7695-2745-0/06, Dec 2006, pp. 384-387.
  13. Beram Fariba Ghorbany. 2014. Effective Parametersof Image Steganography Techniques, International Journal of Computer Applications Technology and Research, vol. 3, no. 6, 2014, pp. 361-363.
  14. Suresh Babu, K. , Raja, K. B. , Kiran Kumar K, Manjula Devi T H, Venugopal K R, Patnaik,L. M. 2008. Authentication of Secret Information in Image Steganography, TENCON 2008-2008 IEEE Region 10 Conference, 2008, pp. 1-6.
Index Terms

Computer Science
Information Sciences

Keywords

LSB DCT DWT MSE(Mean Squared Error) PSNR(Peak Signal to Noise Ratio) BER(Bit Error Rate) Steganography.