An Introduction of Image Steganographic Techniques and Comparison

as a society, humans have continually sought new and efficient ways to communicate. The earliest methods included cave drawings, smoke signals, and drums. Advancements of civilization introduced written language, telegraph, radio/television, and most recently electronic mail. As more and more communication is conducted electronically, new needs, issues, and opportunities are born. Steganography can be used to hide or cover the existence of communication. Steganography is not a new science. Some of the first documented examples of steganography can be found in the Histories of Herodotus, where the father of history relates several stories from the times of ancient Greece. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

[1]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[2]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[3]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[4]  Jiri Fridrich,et al.  Secure Steganographic Methods for Palette Images , 1999, Information Hiding.

[5]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..