Image Steganography: A Conceptual Study of Different Techniques

In the era of internet, a large number of important files is shared through the internet. These files are of great significance from the point of view of privacy. So proper security is needed in order to achieve the secure transfer of files, many different techniques are used so that data in these files can’t be intercepted by the third party. To achieve security, different technologies like cryptography and steganography are used. In cryptography, information is encrypted but its existence is not hidden. But in Steganography, the existence of secure information is also hidden. Steganography is the novel and decent technique of embedding important secret information in the cover medium like text, audio, video etc. The main use of steganography is to hide the important information as well as its existence from the third party. This paper discusses image steganography and various techniques used in image steganography. In image steganography, to achieve the secure transfer of information, the message is embedded into an image which acts as a cover image and after applying different steganography techniques, a stego-image is generated that contains the hidden information. There are various techniques of image steganography like Spatial Technique, Transformation Technique, Distortion Domain Technique, Masking and filtering etc. KeywordsSteganography, stego-image, Spatial Domain Technique, Transform Domain Techniques, Distortion Domain Techniques, Masking and filtering, Magic LSB, Cyclic LSB.

[1]  Dinesh U. Acharya,et al.  An Integer Wavelet Transform Based Steganography Technique for Color Images , 2013 .

[2]  Kamred UdhamSingh A Survey on Image Steganography Techniques , 2014 .

[3]  Nadeem Akhtar,et al.  Enhancing the Security and Quality of LSB Based Image Steganography , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[4]  Amandeep Kaur,et al.  STEGANOGRAPHIC APPROACH FOR HIDING IMAGE IN DCT DOMAIN , 2011 .

[5]  Weiming Zhang,et al.  Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.

[6]  Kamaldeep Joshi,et al.  A new LSB-S image steganography method blend with Cryptography for secret communication , 2015, 2015 Third International Conference on Image Information Processing (ICIIP).

[7]  Khan Muhammad,et al.  A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model , 2015, ArXiv.

[8]  D. Agrawal,et al.  Random image steganography in spatial domain , 2013, 2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT).

[9]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[10]  Fawzi M. Al-Naima,et al.  A modified high capacity image steganography technique based on wavelet transform , 2010, Int. Arab J. Inf. Technol..

[11]  Kamaldeep Joshi,et al.  PSNR and MSE based investigation of LSB , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

[12]  Rupinder Kaur,et al.  A Review on Image Steganography Techniques , 2015 .

[13]  Kamaldeep Joshi,et al.  An Enhanced Method for Data Hiding using 2-Bit XOR in Image Steganography , 2016 .

[14]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[15]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[16]  Arambam James Singh,et al.  Understanding Steganography over Cryptography and Various Steganography Techniques , 2015 .

[17]  G. Zayaraz,et al.  Modulo based Image Steganography Technique against Statistical and Histogram Analysis , 2011 .

[18]  Souvik Roy,et al.  Online payment system using steganography and visual cryptography , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.