A Review on Image Steganography Techniques

The emerging Internet Technology has led to the need of high level of security of data during its transmission. For this purpose steganography plays a major role in society. Steganography is basically the art of secretly hiding data or message in any cover medium such as an image, audio or video. Hence it allows secret communication to take place without the knowledge of any unintended user. This article gives a brief overview of image steganography and the techniques used for hiding data in the cover image to obtain stego image. The evaluation of performance is based on the value of PSNR.

[1]  T. Vigneswaran,et al.  Steganographic Method Image Security Based on Optimal Pixel Adjustment Process and Integer Wavelet Transform , 2013 .

[2]  Manoj Kumar Ramaiya,et al.  Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[3]  Robert X. Gao,et al.  Discrete Wavelet Transform , 2011 .

[4]  Sunny Dagar,et al.  Highly randomized image steganography using secret keys , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[5]  M. Jamzad,et al.  A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[6]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[7]  A. Nag,et al.  An image steganography technique using X-box mapping , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[8]  Khalid A. Darabkh,et al.  An improved image least significant bit replacement method , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[9]  R. Bhavani,et al.  A modified secure digital image steganography based on Discrete Wavelet Transform , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[10]  Reena M. Patel,et al.  Multiple LSB data hiding based on pixel value and MSB value , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).

[11]  中野 和司,et al.  Discrete Fourier Transform(DFT)の数値解析とその応用 , 1990 .

[12]  Tanima Dutta,et al.  Least significant bit matching steganalysis based on feature analysis , 2013, 2013 National Conference on Communications (NCC).

[13]  D. Agrawal,et al.  Random image steganography in spatial domain , 2013, 2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT).

[14]  D.R. Denslin Brabin,et al.  QET based steganography technique for JPEG images , 2009, 2009 International Conference on Control, Automation, Communication and Energy Conservation.

[15]  Ashish Chawla,et al.  A Modified Secure Digital Image Steganography Based on Dwt Using Matrix Rotation Method , 2013 .

[16]  Yilong Yin,et al.  SAR image segmentation based on Artificial Bee Colony algorithm , 2011, Appl. Soft Comput..

[17]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[18]  El-Sayed M. El-Alfy Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network , 2013, 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).

[19]  Mohit Garg,et al.  A Novel Text Steganography Technique Based on Html Documents , 2011 .

[20]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[21]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[22]  Emil Slusanschi,et al.  Data Hiding Using Steganography , 2013, 2013 IEEE 12th International Symposium on Parallel and Distributed Computing.