Current status and key issues in image steganography: A survey

Steganography and steganalysis are the prominent research fields in information hiding paradigm. Steganography is the science of invisible communication while steganalysis is the detection of steganography. Steganography means "covered writing" that hides the existence of the message itself. Digital steganography provides potential for private and secure communication that has become the necessity of most of the applications in today's world. Various multimedia carriers such as audio, text, video, image can act as cover media to carry secret information. In this paper, we have focused only on image steganography. This article provides a review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes. In addition, image quality metrics that can be used for evaluation of stego images and cover selection measures that provide additional security to embedding scheme are also highlighted. Current research trends and directions to improve on existing methods are suggested.

[1]  Bülent Sankur,et al.  Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.

[2]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[3]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[4]  Hedieh Sajedi,et al.  Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[5]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[6]  K. Kanimozhi,et al.  Dual transform based steganography using wavelet families and statistical methods , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[7]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[8]  Christophe De Vleeschouwer,et al.  Circular interpretation of histogram for reversible watermarking , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[9]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[10]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[11]  Kuo-Liang Chung,et al.  A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..

[12]  S. M. Youssef,et al.  C7. A multi-level information hiding integrating wavelet-based texture analysis of block partition difference images , 2012, 2012 29th National Radio Science Conference (NRSC).

[13]  Amit Phadikar,et al.  Data hiding based quality access control of digital images using adaptive QIM and lifting , 2011, Signal Process. Image Commun..

[14]  Shadrokh Samavi,et al.  Steganalysis and payload estimation of embedding in pixel differences using neural networks , 2010, Pattern Recognit..

[15]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[16]  G. Aghila,et al.  Reversible dynamic secure steganography for medical image using graph coloring , 2013 .

[17]  Fei Peng,et al.  Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..

[18]  Hedieh Sajedi,et al.  Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.

[19]  B. S. Manjunath,et al.  Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.

[20]  Chin-Chen Chang,et al.  A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[21]  P. Nadiya,et al.  Image steganography in DWT domain using double-stegging with RSA encryption , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.

[22]  Shen Wang,et al.  A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..

[23]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[24]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[25]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[26]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .

[27]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[28]  Tomás Pevný,et al.  Benchmarking for Steganography , 2008, Information Hiding.

[29]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[30]  Shahrokh Ghaemmaghami,et al.  High Capacity Image Steganography in Wavelet Domain , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[31]  Pradeep M. Patil,et al.  Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..

[32]  Hedieh Sajedi,et al.  ContSteg: Contourlet-Based Steganography Method , 2009, Wirel. Sens. Netw..

[33]  Chin-Chen Chang,et al.  Optimizing least-significant-bit substitution using cat swarm optimization strategy , 2012, Inf. Sci..

[34]  Jeng-Shyang Pan,et al.  Reversible data hiding based on multilevel histogram modification and sequential recovery , 2011 .

[35]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[36]  Carl E. Halford,et al.  Developing operational performance metrics using image comparison metrics and the concept of degradation space , 1999 .

[37]  Heung-Kyu Lee,et al.  Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..

[38]  Manish Mahajan,et al.  Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques , 2012 .

[39]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[40]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[41]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[42]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[43]  Xingming Sun,et al.  A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .

[44]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[45]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[46]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[47]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[48]  Yao Zhao,et al.  PM1 steganography in JPEG images using genetic algorithm , 2008, Soft Comput..

[49]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[50]  Junji Shikata,et al.  On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems , 2008, Trans. Data Hiding Multim. Secur..

[51]  A. Khamrui,et al.  A Genetic Algorithm based steganography in frequency domain (GASFD) , 2011, 2011 International Conference on Communication and Industrial Application.

[52]  Gandharba Swain,et al.  Steganography using two sided, three sided, and four sided side match methods , 2013, CSI Transactions on ICT.

[53]  Sudhir Keshari,et al.  Weighted fractional Fourier Transform based image Steganography , 2011, 2011 International Conference on Recent Trends in Information Systems.

[54]  S. K. Muttoo,et al.  Distortionless Data Hiding Based on Slantlet Transform , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[55]  Tung-Shou Chen,et al.  Data embedding using pixel value differencing and diamond encoding with multiple-base notational system , 2012, J. Syst. Softw..

[56]  Chin-Chen Chang,et al.  Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..

[57]  Fenlin Liu,et al.  Selecting Cover for Image Steganography by Correlation Coefficient , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[58]  Amir Hossein Farzaneh,et al.  Eigenvalue Steganography based on eigen characteristics of quantized DCT matrices , 2011, ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia.

[59]  Hyoung Joong Kim,et al.  Modified BCH data hiding scheme for JPEG steganography , 2012, EURASIP Journal on Advances in Signal Processing.

[60]  E. Chang,et al.  Grey level modification steganography for secret communication , 2004, 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004.

[61]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[62]  Chin-Chen Chang,et al.  A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies , 2013, J. Syst. Softw..

[63]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[64]  Tom Fawcett,et al.  ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .

[65]  Hsien-Chu Wu,et al.  Reversible image steganographic scheme via predictive coding , 2010, Displays.

[66]  Fan Zhang,et al.  The upper and lower bounds of the information-hiding capacity of digital images , 2008, Inf. Sci..

[67]  Manoj Kumar Ramaiya,et al.  Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[68]  Chin-Chen Chang,et al.  A reversible data hiding scheme for VQ indices using locally adaptive coding , 2011, J. Vis. Commun. Image Represent..

[69]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[70]  Robert M. Hierons,et al.  High Capacity Steganographic Method Based Upon JPEG , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[71]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[72]  Z. Jane Wang,et al.  Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding , 2011, IEEE Transactions on Information Forensics and Security.

[73]  S. K. Muttoo,et al.  A Multilayered Secure , Robust and High Capacity Image Steganographic Algorithm , 2011 .

[74]  Weiwei Liu,et al.  Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.

[75]  Eiji Kawaguchi,et al.  Principles and applications of BPCS steganography , 1999, Other Conferences.

[76]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[77]  Chien-Ping Chang,et al.  High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..

[78]  Wei Liu Data hiding in JPEG 2000 code streams , 2004, ICIP.

[79]  T. Kailath The Divergence and Bhattacharyya Distance Measures in Signal Selection , 1967 .

[80]  Fawzi M. Al-Naima,et al.  High Capacity Image Steganography Based on Curvelet Transform , 2011, 2011 Developments in E-systems Engineering.

[81]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[82]  Jamshid Shanbehzadeh,et al.  A steganographic method based on Integer Wavelet Transform and Genetic Algorithm , 2011, 2011 International Conference on Communications and Signal Processing.

[83]  Shih-Hsu Chang,et al.  A 9/7 wavelet-based lossless data hiding , 2011, 2011 IEEE Symposium On Computational Intelligence For Multimedia, Signal And Vision Processing.

[84]  Zhicheng Ni,et al.  Distortionless data hiding based on integer wavelet transform , 2002 .

[85]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[86]  Nasir D. Memon,et al.  Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.

[87]  Sushil Kumar,et al.  Secure image steganography based on Slantlet transform , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).

[88]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[89]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[90]  Qingzhong Liu,et al.  JPEG compression immune steganography using wavelet transform , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[91]  Chin-Chen Chang,et al.  A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..

[92]  Xingang You,et al.  A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[93]  N. Kamaraj,et al.  Varying radix numeral system based adaptive image steganography , 2011, Inf. Process. Lett..

[94]  Xiangwei Kong,et al.  Secure steganography based on binary particle swarm optimization , 2009 .

[95]  Heung-Kyu Lee,et al.  Multi Bit Plane Image Steganography , 2006, IWDW.

[96]  Cheng-Hsing Yang,et al.  A data hiding scheme using the varieties of pixel-value differencing in multimedia images , 2011, J. Syst. Softw..

[97]  Yongjian Hu,et al.  An improved VLC-based lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..

[98]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[99]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[100]  Yongjian Hu,et al.  A high capacity lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..