CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Detailed Survey of Image Steganography Methods

by Dayabati Markam, Devashri Deoskar, Amit Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 51
Year of Publication: 2023
Authors: Dayabati Markam, Devashri Deoskar, Amit Saxena
10.5120/ijca2023922643

Dayabati Markam, Devashri Deoskar, Amit Saxena . A Detailed Survey of Image Steganography Methods. International Journal of Computer Applications. 184, 51 ( Mar 2023), 45-51. DOI=10.5120/ijca2023922643

@article{ 10.5120/ijca2023922643,
author = { Dayabati Markam, Devashri Deoskar, Amit Saxena },
title = { A Detailed Survey of Image Steganography Methods },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2023 },
volume = { 184 },
number = { 51 },
month = { Mar },
year = { 2023 },
issn = { 0975-8887 },
pages = { 45-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number51/32655-2023922643/ },
doi = { 10.5120/ijca2023922643 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:38.056008+05:30
%A Dayabati Markam
%A Devashri Deoskar
%A Amit Saxena
%T A Detailed Survey of Image Steganography Methods
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 51
%P 45-51
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security systems are very popular in many places because technology is getting better and better every day. Information security can be achieved by utilizing encryption and steganography. Cryptography is typically associated with scrambling plain text into cipher ext and back again in today's world. Maintaining the safety of confidential information has always been a major concern, from ancient times to the present. As a result, numerous methods for securely transferring data were developed, one of which is steganography. Steganography takes cryptography one step further by concealing an encrypted message so that no one is aware of its existence. The primary goal of Steganography is to conceal the embedded data's existence. Due to the remarkable advancement in computational power, the steganography technique has enhanced the security of existing methods for hiding data. Steganography system fundamentals, evaluation methods, and security aspects, as well as various spatial and transform domain embedding schemes, are discussed in this article. In addition, a brief overview of various image steganography methods is provided in this paper.

References
  1. K. G. Maheswari, C. Siva, G. Nalinipriya, H. M, J. V and R. R, “An Innovative Model for Secure Environment Using Steganograph”, 2022 8th International Conference on Smart Structures and Systems (ICSSS), 2022, pp. 1-5,
  2. A. Sahu, G. Swain and G. Swain, “Dual steganography imaging based reversible data hiding using improved LSB matching”, International Journal of Intelligent Engineering and Systems, vol. 12, no. 5, pp. 63-73, 2019.
  3. Dalal, Mukesh & Juneja, Mamta. (2021). Steganography and Steganalysis (in digital forensics): a Cybersecurity guide. Multimedia Tools and Applications. Douglas, M., Bailey, K., Leeney, M., “An overview of steganography techniques applied to the protection of biometric data”, Multimedia Tools & Applications Vol.  77, (2018). https://doi.org/10.1007/s11042-017-5308-3,
  4. J. Bieniasz, P. Bąk and K. Szczypiorski, “StegFog: Distributed Steganography Applied to Cyber Resiliency in Multi Node Environments”, IEEE Access, vol. 10, pp. 88354-88370, 2022, doi: 10.1109/ACCESS.2022.3199749.
  5. G. F. Siddiqui, “A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems”,  IEEE Access, vol. 8, pp. 181893-181903, 2020, doi: 10.1109/ACCESS.2020.3028315.,
  6. Chaudhary, Dev & Srivastava, Sandeep & Choudhury, Tanupriya. (2018), “Steganography for Confidential Communication and Secret Data storage” 461-465. 10.1109/ICGCIoT.2018.8753034.
  7. Y. Yang, R. Pintus, H. Rushmeier, and I. Ivrissimtzis, “A 3D steganalytic algorithm and steganalysis-resistant watermarking”, IEEE Trans. Vis. Comput. Graphics, vol. 23, no. 2, pp. 10021013, Feb. 2017
  8. Rabie, Tamer & Kamel, I.. (2017). “High-capacity steganography: a global adaptive region discrete cosine transform approach”, Multimedia Tools and Applications. vol. 76. 10.1007/s11042-016-3301-x,
  9. Nazari Mahboubeh, Ahmadi Iman Dorostkar, “A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity”, Multimedia Tools and Applications 2020 ;79:13693–724. Maheswari, S Uma & D, Jude. (2015), “Discrete ripplet transform based steganography system for imaging applications”, International Journal of Reasoning-based Intelligent Systems. 7. 130. 10.1504/IJRIS.2015.070927.
  10. A. Melman and O. Evsutin, “On the Efficiency of Metaheuristic Optimization for Adaptive Image Steganography in the DFT Domain”, 2021 XVII International Symposium, Problems of Redundancy in Information and Control Systems, (REDUNDANCY), 2021, pp. 49-54, S. Khashandarag and N. Ebrahimian, “A New Method for Color Image Steganography Using SPIHT and DFT, Sending with JPEG Format”, 2009 International Conference on Computer Technology and Development, 2009, pp. 581-586, doi: 10.1109/ICCTD.2009.14.
  11. Mandal, Jyotsna & Ghosal, Sudipta. (2013), “Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication” (SDHTIWCIA). Advances in Computing and Information Technology (pp.767-776) 2013.
  12. P. Sharma and A. Sharma, “Robust technique for steganography on Red component using 3-DWT-DCT transform”, 2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018, pp. 1049-1054, doi: 10.1109/ICISC.2018.8398962.
  13. Jothy N, Anusuyya S., “A secure color image steganography using integer wavelet transform”. In: 10th international conference on intelligent systems and control (ISCO); 2016. https://doi.org/10.1109/ISCO.2016.7726948.
  14. Baby, Della & Thomas, Jitha & Augustine, Gisny & George, Elsa & Michael, Neenu. (2015), “A Novel DWT Based Image Securing Method Using Steganography”, Procedia Computer Science. 46. 612-618. 10.1016/j.procs.2015.02.105.
  15. M. M.; Huy, V. N.; Tuan, N. M., “Some operational properties of the Laguerre transform”, AIP Conference Proceedings 1798, 020130 (2017); doi: 10.1063/1.4972722, 2017
  16. G. Mandyam and N. Ahmed, “The discrete Laguerre transform: derivation and applications”, in IEEE Transactions on Signal Processing, vol. 44, no. 12, pp. 2925-2931, Dec. 1996, doi: 10.1109/78.553468.
  17. Debnath, L. ,“An application of laguerre transform on the problem of oscillation of a very long and heavy chain”, Ann. Univ. Ferrara 9, 149–151 (1959). https://doi.org/10.1007/BF02835444
  18. Sudipta Kr Ghosal, Souradeep Mukhopadhyay, Sabbir Hossain, Ram Sarkar, “Exploiting Laguerre transform in Image Steganography”, Computers & Electrical Engineering, Volume 89, 2021, https://doi.org/10.1016/j.compeleceng.2020.106964
  19. Mustafa Sabah Taha, Mohd Shafry Mohd Rahim, Sameer abdulsattar lafta, Mohammed Mahdi Hashim, Hassanain Mahdi Alzuabidi, “Combination of Steganography and Cryptography: A short Survey”, 2nd International Conference on Sustainable Engineering Techniques (ICSET 2019)
  20. R. Sulaiman, C. Kirana, T. Sugihartono, Laurentinus and F. Panca Juniawan, “RC4 Algorithm and Steganography to Double Secure Messages in Digital Image”, 2020 8th International Conference on Cyber and IT Service Management (CITSM), 2020, pp. 1-4, doi: 10.1109/CITSM50537.2020.9268833.
  21. M. H. Abood, “An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms”, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), pp. 86-90, 2017.
  22. R. Sulaiman, B. Isnanto, Hengki and C. Kirana, “Cryptography in (LSB) Method Using RC4 Algorithm and AES Algorithm in Digital Image to Improve Message Security”, 2018 International Conference on Computing Engineering and Design (ICCED), pp. 29-34, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Image steganography cryptography DWT DCT DWT IFT LT