Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Survey on Different Techniques of Image Steganography

by Omkar Shetye, Chinmay Vanmali, Moses Fernandes, Prachi Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 3
Year of Publication: 2016
Authors: Omkar Shetye, Chinmay Vanmali, Moses Fernandes, Prachi Patil
10.5120/ijca2016908759

Omkar Shetye, Chinmay Vanmali, Moses Fernandes, Prachi Patil . Survey on Different Techniques of Image Steganography. International Journal of Computer Applications. 138, 3 ( March 2016), 36-38. DOI=10.5120/ijca2016908759

@article{ 10.5120/ijca2016908759,
author = { Omkar Shetye, Chinmay Vanmali, Moses Fernandes, Prachi Patil },
title = { Survey on Different Techniques of Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 3 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 36-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number3/24363-2016908759/ },
doi = { 10.5120/ijca2016908759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:38:44.516131+05:30
%A Omkar Shetye
%A Chinmay Vanmali
%A Moses Fernandes
%A Prachi Patil
%T Survey on Different Techniques of Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 3
%P 36-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the technique that hides any data behind other data. Many different carrier file formats can be used but digital images are the most popular ones because of their frequency on the Internet. Steganography are of four types –text, image, audio and video. There are many Steganography techniques for hiding secret information in images. A survey of image steganography is done here and all the techniques to hide a secret image behind an cover image are described.

References
  1. C. G. Zhi-Hui Wang and C.-C. Chang, “A novel (n, n) secret image sharing scheme based on sudoku,” JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, vol. 11, March 2013.
  2. S. K. B. SumanChakraborty, Sudipta Roy, “Image steganography using dna sequence and sudoku solution matrix,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, February 2012.
  3. C.-C. Chang, “A sudoku-based secret image sharing scheme with reversibility,” JOURNAL OF COMMUNICATIONS, vol. 5, January 2010.
  4. R.Poornima and R.J.Iswarya, “An overview of digital image steganography,” International Journal of Computer Science and Engineering Survey, vol. 4, 2013.
  5. DeepeshRawat and VijayaBhandari, “A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image,”International Journal of Computer Applications (0975 – 8887),Volume 64– No.20, February 2013.
  6. R. S. AnkitChadha, NehaSatam and D. Bade, “An efficient method for image and audio steganography using least significant bit (lsb) substitution,” International Journal of Computer Applications (0975 –8887), vol. 77, September 2013.
  7. A. K. Mrs. Kavitha, KavitaKadam and P. Dunghav, “Steganography using least signicantbit algorithm,” International Journal of Engineering Research and Applications(IJERA), vol. 2, pp. 338–341, May-June 2012.
  8. JagvinderKaur and Sanjeev Kumar, ” Study and Analysis of Various Image Steganography Techniques” IJCST Vol.2, Issue 3, September 2011.
  9. Palak R Patel and Yask Patel, “Survey on Different Methods of Image Steganography, ”International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 12, December 2014.
  10. Kambe et al., “COPYRIGHT CONTROL SYSTEM,” United States Patent, 5,818,933, Oct. 6, 1998.
  11. S.Brindha Senior Lecturer, Computer Networking, PSG Polytechnic College, Coimbatore, India “Hiding Fingerprint in Face using Scattered LSB Embedding Steganographic Technique for Smart card based Authentication system,” International Journal of Computer Applications (0975–8887) Volume 26–No.10, July 2011.
  12. Robert Rosenthal,Department of Psychology, University of California, Riverside, Riverside, California “Covert Communication in Laboratories, Classrooms, and the Truly Real World,” CURRENT DIRECTIONS IN PSYCHOLOGICAL SCIENCE,2003.
  13. Seung-Jin Ryu, Hae-Yeoun Lee, Dong-HyuckIm, Jung-HoChoi, Heung-KyuLee,”ELECTROPHOTOGRAPHIC PRINTER IDENTIFICATION BY HALFTONE TEXTURE ANALYSIS,” Korea Advanced Institute of Science and Technology, Republic of Korea Kumoh National Institute of Technology, Republic of Korea,2010.
Index Terms

Computer Science
Information Sciences

Keywords

LSB method DNA sequence method Reversibility method and (n n) secret sharing scheme method.