A brief overview of data hiding methods in digital images

Бесплатный доступ

The Internet and wireless communications have created new opportunities for the mass exchange of multimedia information. This has created new challenges in terms of the security and storage of the information transmitted through global and local networks. This article is devoted to the study of steganography methods of safety, in particular, those based on LSB concealment, in the spatial area of digital images. The classification of steganography methods has given based on the works of the last 5 years. The most popular and widespread image steganography methods have been investigated, describing their merits and challenges. The most commonly used terminology was identified and various methods of data concealment are presented. The visual and statistical steganalysis methods for computing the statistical difference between the input image and the stegoimage is also considered. The article may be useful to researchers in developing new, more effective steganography methods of information hiding.

Еще

Information security, steganography, information hiding, image steganography, steganalysis

Короткий адрес: https://sciup.org/140256276

IDR: 140256276   |   DOI: 10.18469/ikt.2020.18.4.06

Список литературы A brief overview of data hiding methods in digital images

  • Abbas C. et al. Digital image steganography: Survey and analysis of current methods. Signal Processing, 2010, vol. 90, no. 3, pp. 727-752
  • Asifullah K., Sana A.M., Ayesha S. A recent survey of reversible watermarking techniques. International Journal of Information Sciences, 2014, pp. 251-272. DOI: 10.1016/j.ins.2014.03.118
  • Ahmad A.M., Ali A.H., Mahmoud F. An improved capacity data hiding technique based on image interpolation. Multimedia Tools and Applications, 2019, vol. 78, no. 6, pp. 7181-7205
  • Li B. et al. A survey on image steganography and steqanalysis. Journal of Information Hiding and Multimedia Signal Processing, 2011, vol. 2, no. 2, pp. 142-172
  • Chin N.Y., Shen C.H., Cheonshik K. Improving stego image quality in image interpolation based data hiding. Computer Standards & Interfaces, 2017, pp. 209-215. DOI: 10.1016/j.csi.2016.10.005
  • Rajkumar L.B., Ambika U. A survey paper on steganography techniques. International Journal of Innovative Research in Computerand Communication Engineering, 2016, vol.4,no.1,pp.721-730. DOI: 10.15680/IJIRCCE.2016.0401158
  • Eltyeb E., Elgabar A. Comparison of LSB steganography in BMP and JPEG images. International Journal of Soft Computing and Engineering, 2013, vol. 3, no. 5, pp. 91-95
  • Hedieh S., Mansour J. Evolutionary rule generation for signature-based cover selection steganography. Computer and Information Technology Workshops: Proc. IEEE 8th International Conference on 2008, 2008, pp. 379-384. DOI: 10.1109/CIT.2008
  • Jung K.H., Yoo K.Y. Data hiding method using image interpolation. Comput Stand Interfaces, 2009, vol. 31, no. 2, pp. 465-470
  • Junying Y., Haishan C. Embedding suitability adaptive cover selection for image steganography. International Conference on e Education, e-Business and Information Management (ICEEIM), 2014, pp. 36-39
  • Kefa R. Steganography the art of hiding data. Information Technology, 2004, vol. 3, no. 3, pp. 245-269. DOI: 10.3923/itj.2004.245.269
  • Mehdi H. et al. Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 2018, vol. 65, no. 3, pp. 46-66. DOI: 10.1016/j.image.2018.03.012
  • Manju N., Monika M. Steganography: The art of hiding text in image using Matlab. International Journal of Advanced Research in Computer science, 2013, vol. 4, no. 8, pp. 206-210. DOI: 10.26483/ijarcs.v4i8.1788
  • Mansi S.S., Vijay H.M. Current status and key issues in image steganography: A survey. Computer Science Review, 2014, vol. 13, no. 14, pp. 95-113. DOI: 10.1016/j.cosrev.2014.09.001
  • Mansi S.S., Vijay H.M. Performance evaluation of image steganography based on cover selection and contourlet transform. International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, India, Pune, 2014, pp. 231-236. DOI: 10.1109/CUBE.2013.39
  • Manasi J., Arpita M., Kankana D. A secure Image steganography using efficient map based LSB technique. International Journal of Advanced Research in Computer Science and Software Engineering, 2016, vol. 6, no. 3, pp. 657-660
  • Mamta Y., Amita D. Image steganography techniques: A review. International Journal for Innovative Research in Science & Technology, 2015, vol. 2, no. 2, pp. 243-248
  • Mehdi K., Husrev T.S., Nasir D.M. Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging, 2006, vol. 15, no. 4, DOI: 10.1117/1.2400672
  • Nazinder K., Amanjot K. Art of steganography. International Journal of Advanced Trends in Computer Applications, 2017, vol. 4, no. 2, pp. 30-33. DOI: 10.1016/j.sigpro.2009.08.010
  • Johnson N.F., Jajodia S. Exploring steganography: Seeing the unseen. IEEE Computer, 1998, vol. 31, no. 2, pp. 26-34
  • Nissar A., Mir A. Classification of steganalysis techniques: A study. Digital Signal Processing, 2010, vol. 20, no. 6, pp. 1758- 1770. DOI: 10.1016/j.dsp.2010.02.003
  • Sheluhin O.I., Kanaev S.D. Steganography. Algorithms and Software Implementation. Moscow: Gorjachaja linija - Telekom, 2017, 592 p. (In Russ.)
  • Seyyedi S.A., Ivanov N. A novel secure steqanography method based on zero tree method. International Journal of Advanced Studies in Computer Science and Engineering, 2014, vol. 3, no. 3, pp. 1-9
  • Shamsul K. et al. A steganographic technique for highly compressed JPG images. Computer Science Review, 2013, vol. 10, no. 5, pp. 107-118
  • Sakit V. et al. An overview of steqanalysis methods. Actual Multi-Disciplinary Scientific-Practical Problems of Information Security: Proceedings of the V Republican Conference, Baku, 2019, pp. 204-206. (In Azerbaijani). DOI: 10.25045/NCInfoSec.2019.50
  • Verdiyev S.Q., Nagiyeva A.F. Experimental analysis of steganography. Actual Multi-Disciplinary Scientific-Practical Problems of Information Security: Proceedings of the III Republican Conference, Baku, 2017, pp. 51- 55. (In Azerbaijani). DOI: 10.25045/NCInfoSec.2017.10
Еще
Статья научная