Steganographic Techniques of Data Hiding Using Digital Images (Review Paper)

Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography. Defence Science Journal, 2012, 62(1), pp.11 -18 ,  DOI:http://dx.doi.org/10.14429/dsj. 62.1436

[1]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[2]  Aman Jantan,et al.  A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion , 2008 .

[3]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[4]  Farhad Keissarian Hiding secrete data in compressed images using histogram analysis , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[5]  Vojtech Holub,et al.  On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.

[6]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[7]  Chin-Chen Chang,et al.  An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..

[8]  H. B. Kekre,et al.  High payload using mixed codebooks of Vector Quantization , 2010 .

[9]  Sukumar Nandi,et al.  Online Voting System Powered by Biometric Security Using Steganography , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[10]  N.A. Ismail,et al.  Secure perceptual data hiding technique using information theory , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..

[11]  Ki-Hyun Jung,et al.  Improved Exploiting Modification Direction Method by Modulus Operation , 2009 .

[12]  Donald E. Grierson,et al.  Comparison among five evolutionary-based optimization algorithms , 2005, Adv. Eng. Informatics.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Eiji Kawaguchi,et al.  Principles and applications of BPCS steganography , 1999, Other Conferences.

[15]  Cheng-Hsing Yang,et al.  Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images , 2009, IAS.

[16]  Che-Wei Lee,et al.  A new steganographic method based on information sharing via PNG images , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[17]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[18]  Chin-Chen Chang,et al.  Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[20]  Wei Sun,et al.  Data Hiding in Block Truncation Coding , 2010, 2010 International Conference on Computational Intelligence and Security.

[21]  M. Kiamini,et al.  A high_performance steganographic method using JPEG and PSO algorithm , 2008, 2008 IEEE International Multitopic Conference.

[22]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[23]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[24]  Honge Ren,et al.  Reversible image hiding algorithm based on pixels difference , 2009, 2009 IEEE International Conference on Automation and Logistics.

[25]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[26]  Chin-Chen Chang,et al.  Lossless recovery of a VQ index table with embedded secret data , 2007, J. Vis. Commun. Image Represent..

[27]  Ching-Yun Chang,et al.  An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited , 2009, ICUIMC '09.

[28]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[29]  Farhad Keissarian Using a Novel Variable Block Size Image Compression Algorithm for Hiding Secret Data , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.

[30]  Wang Jiazhen,et al.  An Authentication Scheme for VQ-Compressed Images , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[31]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[32]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[33]  Hassan Aghaeinia,et al.  A More Secure Steganography Method in Spatial Domain , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[34]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[35]  U. C. Niranjan,et al.  Watermarking medical images with patient information , 1998, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Vol.20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No.98CH36286).

[36]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[37]  Chin-Chen Chang,et al.  A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[38]  Hyoung Joong Kim,et al.  Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.

[39]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[40]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[41]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[42]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[43]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[44]  Cheng-Hsing Yang,et al.  Reversible data hiding of a VQ index table based on referred counts , 2009, J. Vis. Commun. Image Represent..

[45]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[46]  S.T. Maya,et al.  Robust steganography using bit plane complexity segmentation , 2004, (ICEEE). 1st International Conference on Electrical and Electronics Engineering, 2004..

[47]  Taejeong Kim,et al.  Side match and overlap match vector quantizers for images , 1992, IEEE Trans. Image Process..

[48]  Madhumita Sengupta,et al.  Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF) , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[49]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..