Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Comparative Analysis of Image Steganography

International Journal of Computer Applications
© 2010 by IJCA Journal
Number 3 - Article 8
Year of Publication: 2010
R. Akila

R.Amirtharajan, R Akila and P.Deepikachowdavarapu. Article: A Comparative Analysis of Image Steganography. International Journal of Computer Applications 2(3):41–47, May 2010. Published By Foundation of Computer Science. BibTeX

	author = {R.Amirtharajan and R. Akila and P.Deepikachowdavarapu},
	title = {Article: A Comparative Analysis of Image Steganography},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {2},
	number = {3},
	pages = {41--47},
	month = {May},
	note = {Published By Foundation of Computer Science}


Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and in some cases it is desired that the communication be made secret. Two techniques are available to achieve this goal: cryptography and steganography. In this paper, various digital steganographic techniques are implemented which are capable of producing a secret-embedded image that is indistinguishable from the original image to the human eye. A comparative analysis is made to demonstrate the effectiveness of the proposed methods. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR).


  • Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital image steganography: Survey and analysis of current methods Signal Processing 90 (2010) 727–752
  • R.Amirtharajan , R. John Bosco Balaguru, Constructive Role of SFC & RGB Fusion versus Destructive Intrusion International Journal of Computer Applications. Volume 1 – No. 20. ISSN : 0975 – 8887 pp 34-40
  • W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
  • Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  • C.K. Chan, L.M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition 37 (3) (2004) 469–474.
  • W. Diffie and M. E. Hellman, “Exhaustive Cryptanalysis of the NBS Data Encryption Standard,” IEEE Computer, Vol. 10, 1977, pp. 74-84.
  • S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.
  • L.M. Marvel, C.G. Boncelet Jr., C.T. Retter, Spread spectrum image steganography, IEEE Trans. Image Process. 8 (8) (1999) 1075-1083.
  • F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proc. IEEE 87 (7) (1999) 1062–1078.
  • Provos, N., Honeyman, P, Hide and seek: An introduction to steganography, IEEE Security & Privacy Magazine 1 (2003) 32-44.
  • R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, (1978) 120–126.
  • C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function, Pattern Recognition 36 (11) (2003) 2875–2881.
  • Tuomas Aura, Practical invisibility in digital communication, in proceedings of the Workshop on Information Hiding, LNCS 1174 (1996) 265-278.
  • R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3) (2000) 671–683.
  • C.M. Wang, N.I. Wu, C.S. Tsai, M.S. Hwang, A high quality steganography method with pixel-value differencing and modulus function, J. Syst. Software 81 (1) (2008) 150–158.
  • Westfeld Space filling curves in steganalysis in E.J Delp III & P.W. Wong(Eds), Security, steganography and watermarking of multimedia contents VII SPIE 5681, (2005) 28-37
  • C.H. Yang, Inverted pattern approach to improve image quality of information hiding by LSB substitution Pattern Recognition 41 (2008) 2674–2683
  • Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, and Ki-Ryong Kwon, An Image Steganography Using Pixel Characteristics Y. Hao et al. (Eds.): CIS 2005, Part II, Springer-Verlag Berlin Heidelberg LNAI 3802, (2005) 581– 588.
  • Yuan-Hui Yu , Chin-Chen Chang, Iuon-Chang Lin, A new steganographic method for color and grayscale image hiding Computer Vision and Image Understanding 107 (2007) 183–194