Open Access Open Access  Restricted Access Subscription Access

An Extensive Study of Digital Image Steganography Techniques


Affiliations
1 Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana, India

   Subscribe/Renew Journal


The rise of digital technology raises the importance of data security when transmitting data across a wireless communication medium. Steganography is a method of ensuring information security on a digital media. The goal of this work is to look at information hiding techniques in images which are in the spatial domain. This paper will also distinguish between watermarking and steganography, the two most popular domains of information concealment. The paper examines the benefits and drawbacks of existing algorithms, tools, and strategies to safeguard data in the digital image steganography domain.

Keywords

Data Hiding, Information Security, Steganography, Time Domain Techniques, Watermarking.
User
Subscription Login to verify subscription
Notifications
Font Size

  • J. Singh and M. Singla, “Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform,” Int. J. Electr. Electron. Res., vol. 10, no. 2, pp. 122–125. [Online]. Available: https://ijeer.forexjournal.co.in/papers-pdf/ijeer-100212.pdf
  • G. C. Kessler and C. Hosmer, “An overview of steganography,” Advances Comput., vol. 83, pp. 51–107, 2011, doi; 10.1016/B978-0-12-385510-7.00002-3.
  • A. K. Singh, J. Singh, and H. V. Singh, “Steganography in images using LSB technique,” Int. J. Latest Trends Eng. Technol., vol. 5, no. 1, pp. 426–430, 2015. https://www.ijltet.org/wp-content/uploads/2015/02/60.pdf
  • A. U. Rahman, K. Sultan, D. Musleh, N. Aldhafferi, A. Alqahtani, and M. Mahmud, “Robust and fragile medical image watermarking: A joint venture of coding and chaos theories,” J. Healthcare Eng., vol. 2018, 2018, Art. no. 8137436.
  • M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process.: Image Communication, vol. 65, pp. 46–66, 2018, doi: 10.1016/j.image.2018.03.012.
  • S. Jeevitha and N. A. Prabha, “A comprehensive review of steganographic techniques and implementation,” ARPN J.Eng. Appl. Sciences, vol. 13, no. 17, pp. 4780–4791, 2018. http://www.arpnjournals.org/jeas/research_papers/rp_2018/jeas_0918_7268.pdf
  • J. Nanwal and P. Nanwal, “Design and implementation of Spatial Domain Technique in Steganography using RSA Encryption with genetic algorithm,” Indian J. Comp. Sci., vol. 2, no. 5, pp.13–18, 2017.
  • I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, “A comprehensive survey of image steganography: Techniques, evaluations, and trends in future research,” Neurocomputing, vol. 335, pp. 299–326, 2018.
  • F. Y. Shih, “Digital watermarking and steganography: Fundamentals and techniques, 2017. CRC press.
  • H. N. Khalid and A. H. M. Aman, “Digital Image Steganography in spatial domain: A critical study,” Technol. Reports of Kansai University, vol. 62, pp. 4559–4569, 2020.
  • A. K. Singh, H. V. Singh, and J. Singh, “Highly Impartible Spatial Domain Steganography in Double Precision Images,” 2nd Int. Conf. Inventive, 2018, pp. 768–771.
  • M. S. Abuali, C. B. M. Rashidi, M. H.Salih, R. A. A. Raof, and S. S. Hussein, “Digital Image Steganography in Spatial Domain a comprehensive review,” J. Theoretical Appl. Inf. Technol., vol. 97, no. 19, pp. 5081–5102, 2019. http://www.jatit.org/volumes/Vol97No19/10Vol97No19.pdf
  • P. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications, and attacks,” Int. J. Eng. Innovative Technol., vol. 2, no. 9, pp. 165–175, 2013. https://www.ijeit.com/vol%202/Issue%209/IJEIT1412201303_31.pdf
  • S. Utama, R. Din, and M. Mahmuddin, “A comparative study of Text Steganography and Linguistic Steganography,” in Proc. Conf. Eng. Technol., Vocation Educ. Social Sci., 2015, Universiti Pendidikan Sultan Idris,Tanjung Malim.
  • Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, “Video steganography: A review,” Neurocomputing, vol. 335, pp. 238–250, 2019, doi: 10.1016/j.neucom.2018.09.091
  • Z. Wang, E.P. Simoncelli, A. C. Bovik, “Multiscale structural similarity for image quality assessment,” in Conf. Record 37th Asilomar Conf. Signals, Syst. & Comput.,” vol. 2., pp. 1398–1402, 2003, doi: 10.1109/ACSSC.2003.1292216.
  • B. T. Ahmed, "A systematic overview of secure image steganography," Int. J. Advances Appl. Sci., vol. 10, no. 2, pp. 178–187, doi: 10.11591/ijaas.v10.i2.pp178-187.
  • D. M. Abdullah, S. Y. Ameen, N. Omar, A. A. Salih, D. M. Ahmed, S. F. Kak, H. M. Yasin, I. M. Ibrahim, A. M Ahmed, and Z. N. Rashid, “Secure data transfer over internet using image steganography: Review,” Asian J. Res. Comp. Sci., vol. 10, no. 3, pp. 33–52, 2021, doi: 10.9734/ajrcos/2021/v10i330243.
  • A. K. Singh, J. Singh, and H. V. Singh, “Steganography in images using LSB technique,” Int. J. Latest Trends Eng. Technol., vol. 5, no.1, pp. 426–430, 2015.
  • S.A. Kumar, S. Juhi, S. H. Vikram, “DCT- and DWT-Based Intellectual Property Right Protection in Digital Images,” In: Bapi, R., Rao, K., Prasad, M. (Eds.) First Int. Conf. Artif. Intell. Cogn. Comput. Advances Intell. Syst. Comput., vol. 815. Springer, Singapore, 2019.

Abstract Views: 213

PDF Views: 0




  • An Extensive Study of Digital Image Steganography Techniques

Abstract Views: 213  |  PDF Views: 0

Authors

Juhi Singh
Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana, India
Mukesh Singla
Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana, India

Abstract


The rise of digital technology raises the importance of data security when transmitting data across a wireless communication medium. Steganography is a method of ensuring information security on a digital media. The goal of this work is to look at information hiding techniques in images which are in the spatial domain. This paper will also distinguish between watermarking and steganography, the two most popular domains of information concealment. The paper examines the benefits and drawbacks of existing algorithms, tools, and strategies to safeguard data in the digital image steganography domain.

Keywords


Data Hiding, Information Security, Steganography, Time Domain Techniques, Watermarking.

References





DOI: https://doi.org/10.17010/ijcs%2F2022%2Fv7%2Fi4%2F172378