A Comparative Study of Various image Steganographic Techniques Used for Information Hiding

Authors

  • K Samiksha G.H.Raisoni College Of Engineering & Management, Amravati, SGBAU University, Amravati, Maharashtra 444602, India
  • Bartere MM G.H.Raisoni College Of Engineering and Management, Amravati, SGBAU University, Amravati, Maharashtra 444602, India

Keywords:

Steganography, image steganography, spatial domain, Transform domain

Abstract

The staggering growth in communication technology and usage of public domain channels (i.e. Internet) has greatly facilitated transfer data. However, such open communication channels have greater vulnerability to security threats causing unauthorized information access. Traditionally, encryption is used to realize the communication security. Today HTML pages and Spam Emails are also being used for steganography. With the help of steganography we can hide the information which is paramount and confidential for us. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than other and all of them have respective strong and weak points. Steganography is a technology where modern data compression, information theory, spread spectrum, any cryptography technologies are brought together to satisfy the need for privacy on the internet. This paper intends to give through understanding and evolution of different existing image steganographic techniques of data hiding in spatial, transform and compression domains. It also discusses that which image format is most appropriate or best for our algorithm and how can we perform compression on that.

References

Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerlprivtech.pdf.

Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001.

Eltyeb E.Abed Elgabar, Haysam A. Ali Alamin, “Comparison of LSB Steganography in GIF and BMP Images ”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-4, September 2013.

Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001.

Atallah M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 - 391.

Priya Thomas," Literature Survey On Modern Image Steganographic Techniques", International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 5, May - 2013 ISSN: 2278-0181.

Y. Lee and L. Chen, “High capacity image steganographic model,” IEE ProceedingsVision, Image and Signal Processing, vol. 147, no. 3, pp. 288–294, 2000.

W. Pennebaker and J. Mitchell, JPEG still image data compression standard. Kluwer Academic Publishers, 1993.

Jiri Fridrich and Du Rui. Secure steganographic methods for palette images. In Inter’l Workshop on Information Hiding, pages 47–60, 1999.

Provos, N., Honeyman, P, Hide and seek: An introduction to steganography, IEEE Security & Privacy Magazine 1 (2003) pp. 32-44

E. Franz and A. Schneidewind., “Adaptive steganography based on dithering”, in Proc. Of the 2004 workshop on Multimedia and Security, 2004. pp. 56-62.

Yang et al., “Adaptive data hiding in edge areas of images with spatial LSB domain systems”, IEEE transactions on information forensics and security, vol. 3, no. 3, september 2008.

I.-C. Lin et al, “Hiding data in spatial domain images with distortion tolerance”, Computer Standards & Interfaces 31 (2009) 458–464.

Downloads

Published

2024-02-26

How to Cite

K, S., & Bartere, M. M. (2024). A Comparative Study of Various image Steganographic Techniques Used for Information Hiding. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(05), 1730–1735. Retrieved from https://ijact.in/index.php/j/article/view/304

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.