Open Access
Subscription Access
An Extensive Study of Digital Image Steganography Techniques
Subscribe/Renew Journal
The rise of digital technology raises the importance of data security when transmitting data across a wireless communication medium. Steganography is a method of ensuring information security on a digital media. The goal of this work is to look at information hiding techniques in images which are in the spatial domain. This paper will also distinguish between watermarking and steganography, the two most popular domains of information concealment. The paper examines the benefits and drawbacks of existing algorithms, tools, and strategies to safeguard data in the digital image steganography domain.
Keywords
Data Hiding, Information Security, Steganography, Time Domain Techniques, Watermarking.
User
Subscription
Login to verify subscription
Font Size
Information
- J. Singh and M. Singla, “Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform,” Int. J. Electr. Electron. Res., vol. 10, no. 2, pp. 122–125. [Online]. Available: https://ijeer.forexjournal.co.in/papers-pdf/ijeer-100212.pdf
- G. C. Kessler and C. Hosmer, “An overview of steganography,” Advances Comput., vol. 83, pp. 51–107, 2011, doi; 10.1016/B978-0-12-385510-7.00002-3.
- A. K. Singh, J. Singh, and H. V. Singh, “Steganography in images using LSB technique,” Int. J. Latest Trends Eng. Technol., vol. 5, no. 1, pp. 426–430, 2015. https://www.ijltet.org/wp-content/uploads/2015/02/60.pdf
- A. U. Rahman, K. Sultan, D. Musleh, N. Aldhafferi, A. Alqahtani, and M. Mahmud, “Robust and fragile medical image watermarking: A joint venture of coding and chaos theories,” J. Healthcare Eng., vol. 2018, 2018, Art. no. 8137436.
- M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process.: Image Communication, vol. 65, pp. 46–66, 2018, doi: 10.1016/j.image.2018.03.012.
- S. Jeevitha and N. A. Prabha, “A comprehensive review of steganographic techniques and implementation,” ARPN J.Eng. Appl. Sciences, vol. 13, no. 17, pp. 4780–4791, 2018. http://www.arpnjournals.org/jeas/research_papers/rp_2018/jeas_0918_7268.pdf
- J. Nanwal and P. Nanwal, “Design and implementation of Spatial Domain Technique in Steganography using RSA Encryption with genetic algorithm,” Indian J. Comp. Sci., vol. 2, no. 5, pp.13–18, 2017.
- I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, “A comprehensive survey of image steganography: Techniques, evaluations, and trends in future research,” Neurocomputing, vol. 335, pp. 299–326, 2018.
- F. Y. Shih, “Digital watermarking and steganography: Fundamentals and techniques, 2017. CRC press.
- H. N. Khalid and A. H. M. Aman, “Digital Image Steganography in spatial domain: A critical study,” Technol. Reports of Kansai University, vol. 62, pp. 4559–4569, 2020.
- A. K. Singh, H. V. Singh, and J. Singh, “Highly Impartible Spatial Domain Steganography in Double Precision Images,” 2nd Int. Conf. Inventive, 2018, pp. 768–771.
- M. S. Abuali, C. B. M. Rashidi, M. H.Salih, R. A. A. Raof, and S. S. Hussein, “Digital Image Steganography in Spatial Domain a comprehensive review,” J. Theoretical Appl. Inf. Technol., vol. 97, no. 19, pp. 5081–5102, 2019. http://www.jatit.org/volumes/Vol97No19/10Vol97No19.pdf
- P. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications, and attacks,” Int. J. Eng. Innovative Technol., vol. 2, no. 9, pp. 165–175, 2013. https://www.ijeit.com/vol%202/Issue%209/IJEIT1412201303_31.pdf
- S. Utama, R. Din, and M. Mahmuddin, “A comparative study of Text Steganography and Linguistic Steganography,” in Proc. Conf. Eng. Technol., Vocation Educ. Social Sci., 2015, Universiti Pendidikan Sultan Idris,Tanjung Malim.
- Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, “Video steganography: A review,” Neurocomputing, vol. 335, pp. 238–250, 2019, doi: 10.1016/j.neucom.2018.09.091
- Z. Wang, E.P. Simoncelli, A. C. Bovik, “Multiscale structural similarity for image quality assessment,” in Conf. Record 37th Asilomar Conf. Signals, Syst. & Comput.,” vol. 2., pp. 1398–1402, 2003, doi: 10.1109/ACSSC.2003.1292216.
- B. T. Ahmed, "A systematic overview of secure image steganography," Int. J. Advances Appl. Sci., vol. 10, no. 2, pp. 178–187, doi: 10.11591/ijaas.v10.i2.pp178-187.
- D. M. Abdullah, S. Y. Ameen, N. Omar, A. A. Salih, D. M. Ahmed, S. F. Kak, H. M. Yasin, I. M. Ibrahim, A. M Ahmed, and Z. N. Rashid, “Secure data transfer over internet using image steganography: Review,” Asian J. Res. Comp. Sci., vol. 10, no. 3, pp. 33–52, 2021, doi: 10.9734/ajrcos/2021/v10i330243.
- A. K. Singh, J. Singh, and H. V. Singh, “Steganography in images using LSB technique,” Int. J. Latest Trends Eng. Technol., vol. 5, no.1, pp. 426–430, 2015.
- S.A. Kumar, S. Juhi, S. H. Vikram, “DCT- and DWT-Based Intellectual Property Right Protection in Digital Images,” In: Bapi, R., Rao, K., Prasad, M. (Eds.) First Int. Conf. Artif. Intell. Cogn. Comput. Advances Intell. Syst. Comput., vol. 815. Springer, Singapore, 2019.
Abstract Views: 214
PDF Views: 0