Evaluating image steganography techniques: Future research challenges

Steganography is the art of “concealed writing” and it refers to techniques that hide information inside innocuous looking objects known as “Cover Objects”. There are different types of covers available for embedding secret information but images are pervasive in day to day applications and have high redundancy in representation. Thus, they are appealing contenders to be used as cover objects. This paper evaluates the different algorithms for digital image steganography both in the spatial and transform domain like LSB substitution, OPAP, Pixel Indicator Technique, F5 etc. and tries to put light on some possible future research directions in the topic of consideration.

[1]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[2]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[3]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[4]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[5]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[6]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[7]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[8]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[9]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[10]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[11]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[12]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[13]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[14]  K. R. Venugopal,et al.  Robust and high capacity image steganography using SVD , 2007 .

[15]  S. Samavi,et al.  Steganalysis of Pixel-Value Differencing Steganographic Method , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[16]  Ioannis Pitas,et al.  Extraction of facial regions and features using color and shape information , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[17]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[18]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[19]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[20]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[21]  Ioannis Pitas,et al.  Face localization and facial feature extraction based on shape and color information , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[22]  Michael Backes,et al.  Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[23]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[24]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[25]  Lee-Ming Cheng,et al.  Improved hiding data in images by optimal moderately-significant-bit replacement , 2001 .

[26]  Ki-Ryong Kwon,et al.  An Image Steganography Using Pixel Characteristics , 2005, CIS.

[27]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[28]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[29]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[30]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[31]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[32]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[33]  Kevin Curran,et al.  Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).

[34]  Anjali A. Shejul,et al.  A Secure Skin Tone based Steganography Using Wavelet Transform , 2011 .

[35]  Juan Jose Roque SLSB: Improving the Steganographic Algorithm LSB , 2009, WOSIS.