A Review on Image Steganography

This paper gives a review of steganography, its various techniques, its advantages and disadvantages, applications, it's merging with cryptography techniques .Today's the rise of the internet become the most important factor of information technology and communication but along with this the threat of information security increases. It's become very important to give security to your data so that no unauthorized person can access it. The steganography is a powerful security tool with which we can hide a secret message inside an object. The object can be text, image, audio or video.

[1]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[2]  Adel Al-Mohammad,et al.  Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility , 2010 .

[3]  Kevin Curran,et al.  A skin tone detection algorithm for an adaptive approach to steganography , 2009, Signal Process..

[4]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[5]  Ankita Agarwal Security Enhancement Scheme for Image Steganography using S-DES Technique , 2012 .

[6]  M. Afrakhteh,et al.  Adaptive steganography scheme using more surrounding pixels , 2010, 2010 International Conference On Computer Design and Applications.

[7]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[8]  Arvind Kumar,et al.  Steganography- A Data Hiding Technique , 2010 .

[9]  Chin-Chen Chang,et al.  An Adaptive Steganography for Index-Based Images Using Codeword Grouping , 2004, PCM.

[10]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[11]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[12]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[13]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[14]  Hideki Noda,et al.  BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..

[15]  Giovanni Battista Porta Image Steganography and Steganalysis , 2004 .

[16]  Geeta Sikka,et al.  A New Image Steganography Based On First Component Alteration Technique , 2010, ArXiv.

[17]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[18]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[19]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[20]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[21]  Heung-Kyu Lee,et al.  Multi Bit Plane Image Steganography , 2006, IWDW.

[22]  Iuon-Chang Lin,et al.  Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.