A Review of Comparison Techniques of Image Steganography

Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography. The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego -image is transformed from spatial domain to the frequency domain and the payload bits are embedded into the frequency components of the cover image. The performance and comparison of these three techniques is evaluated on the basis of the parameters MSE, PSNR, Capacity & Robustness.

[1]  A. Jain,et al.  A JPEG compression resistant steganography scheme for raster graphics images , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[2]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[3]  Vijay Kumar,et al.  Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[4]  Yixian Yang,et al.  Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[5]  Siddharth Nagar,et al.  Image Compression Using Discrete Cosine Transform , 2008 .

[6]  T. Narasimmalou,et al.  Optimized discrete wavelet transform based steganography , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[7]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[8]  K. B. Shiva Kumar,et al.  Coherent steganography using Segmentation and DCT , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[9]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[10]  Arvind Kumar,et al.  Steganography- A Data Hiding Technique , 2010 .

[11]  Vijay Kumar Sharma,et al.  A STEGANOGRAPHY ALGORITHM FOR HIDING IMAGE IN IMAGE BY IMPROVED LSB SUBSTITUTION BY MINIMIZE DETECTION , 2012 .

[12]  A. Touir,et al.  A New Image Steganography Technique , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  J. Shanbehzadeh,et al.  High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm , 2011 .

[14]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[15]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[16]  Neha Batra,et al.  Implementation of Modified 16×16 Quantization Table Steganography on Colour Images , 2012 .

[17]  Fawzi M. Al-Naima,et al.  A modified high capacity image steganography technique based on wavelet transform , 2010, Int. Arab J. Inf. Technol..

[18]  A.I. Hashad,et al.  A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.

[19]  K.R. Venugopal,et al.  Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[20]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.

[21]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .

[22]  Amir-Masoud Eftekhari-Moghadam,et al.  Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.