Image Steganography: A Review

Steganography can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. If it is achieved successfully, the message does not attract attention from eavesdroppers and attackers. The main objectives of steganography are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. These are the main factors which make it different from other techniques watermarking and cryptography. This paper includes the important steganography methods and the main focus is on the review of steganography in digital images.

[1]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[2]  R. Bhavani,et al.  A modified secure digital image steganography based on Discrete Wavelet Transform , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[3]  M. Afrakhteh,et al.  Adaptive steganography scheme using more surrounding pixels , 2010, 2010 International Conference On Computer Design and Applications.

[4]  Rainer Böhme,et al.  Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.

[5]  Yih-Kai Lin,et al.  High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..

[6]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[7]  Kevin Curran,et al.  Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).

[8]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[9]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[10]  Amir-Masoud Eftekhari-Moghadam,et al.  Digital Image Steganography Based on Integer Wavelet Transform and Assignment Algorithm , 2012, 2012 Sixth Asia Modelling Symposium.

[11]  S.B. Sadkhan Cryptography : current status and future trends , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..

[12]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[13]  Iuon-Chang Lin,et al.  Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.

[14]  Shyr-Shen Yu,et al.  A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..

[15]  Elke Franz,et al.  Adaptive steganography based on dithering , 2004, MM&Sec '04.

[16]  Vijay Kumar,et al.  Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[17]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[18]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..