CFP last date
20 May 2024
Reseach Article

Digital Image Steganography Concept and Evaluation

by Seyyed Amin Seyyedi, Rauf. Kh Sadykhov
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 5
Year of Publication: 2013
Authors: Seyyed Amin Seyyedi, Rauf. Kh Sadykhov
10.5120/11080-6021

Seyyed Amin Seyyedi, Rauf. Kh Sadykhov . Digital Image Steganography Concept and Evaluation. International Journal of Computer Applications. 66, 5 ( March 2013), 17-23. DOI=10.5120/11080-6021

@article{ 10.5120/11080-6021,
author = { Seyyed Amin Seyyedi, Rauf. Kh Sadykhov },
title = { Digital Image Steganography Concept and Evaluation },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 5 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number5/11080-6021/ },
doi = { 10.5120/11080-6021 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:33.326808+05:30
%A Seyyed Amin Seyyedi
%A Rauf. Kh Sadykhov
%T Digital Image Steganography Concept and Evaluation
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 5
%P 17-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. There are many steganography techniques with different kind of container. Digital image are the most popular and frequency used on the internet. In this article we consider the main image steganography techniques and those advantages and disadvantages. Also attempt to identify the requirements of a good steganography algorithm and evaluation these algorithms.

References
  1. Sara Khosravi, Mashallah Abbasi Dezfoli, Mohammad Hossein Yektaie. 2011 A new steganography method based HIOP (Higher Intensity Of Pixel) algorithm and Strassen's matrix multiplication, Journal of Global Research in Computer Science.
  2. R. Popa. An analysis of stegonagraphic techniques. 1998. The Politechnica university of Timisoara .
  3. S. Katzenbeisser, F. A. P. Petitcolas. 2000. Information Hiding Techniques for Steganography and Digital Watermarking, Artech House.
  4. Chang, C. C. and Chuang, L. Z. 2004. Introduction to the Visual Cryptography, Communication of the Chinese Cryptology and Information Security Association (CCISA) 1-14.
  5. G. J. Simmons. 2002. "The prisoners' problem and the subliminal channel" in Proc. Advances in Cryptology (CRYPTO '83), 51-67.
  6. Arash Habibi Lashkari. 2011. A survey on image steganography algorithms and evalution. Communication in computer and information science.
  7. Michiharu Niimi, Hideki Noda, Eiji KaWaguchi, Richard Eason. 2002. "High Capacity and Secure Digital Steganography to Palette-Based Images", IEEE.
  8. T. Morkel, J. H. P. Eloff, M. S. Olivier. 2002. An Overview of Image Steganography, University of Pretoria, South Africa.
  9. Bender, W. , Gruhl, D. , Morimoto, N. , and Lu, A. 1996. Techniques for data hiding. IBM Systems Journal, 313-336.
  10. W. Bender, D. Gruhl, N. Morimoto, A. Lu. 1996. Techniques for data hiding. IBM Systems Journal.
  11. Frederick Brundick and Lisa Marvel. 2001. Implementation of Spread Spectrum Image Steganography. Army Research Laboratory,ARL-TR-2433.
  12. Currie, D. L. & Irvine, C. E. 1996. Surmounting the effects of lossy compression on Steganography. 19th National Information Systems Security Conference.
  13. Johnson, N. F. & Jajodia, S. 1998. Exploring Steganography: Seeing the Unseen. Computer Journal.
  14. Meenu Kumari, A. Khare, Pallavi Khare. 2010. JPEG Compression Steganography & Crypography Using Image-Adaptation Technique, Journal of Advances in Information Technology.
  15. Ahmed A. Abdelwahab and Lobna A. Hassaan. 2008. A Discrete Wavelet Transform based technique for image data hiding . 25th National Radio Science Conference (NRSC)
  16. V. Srinivasa rao, Dr P. Rajesh Kumar, G. V. H. Prasad, M. Prema Kumar, S. Ravichand. 2010. Discrete Cosine Transform Vs Discrete Wavelet Transform: An Objective Comparison of Image Compression Techniques for JPEG Encoder. International Journal of Advanced Engineering & Applications.
  17. Rao, K. R. and Yip, P. 1990. Discrete Cosine Transforms - Algorithms, Advantages, Applications, Academic Press.
  18. Arne Jense and Anders la Cour-Harbo. 2001. Ripples in Mathematics: the Discrete Wavelet Transform. Springer.
  19. Bushra Kassim Al-Abudi. 2002. "Colour Image Data Compression Using Multilevel Block Trunsaction Coding Technique", Phd Thesis, College of Science, University of Baghdad.
  20. W. Bender, D. Gruhl, N. Morimoto, A. Lu. 1996 Techniques for data hiding. IBM Systems Journal.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography image compression LSB Palette base LSB Spread Spectrum Patch work Pseudorandom Permutations DCT DWT