Abstract
Creating and distributing digital images can involve processing more than pixel colors. Information embedded in digital images is used to determine authorship, time stamps, qualitative information about the image, and other metadata. Higher security is needed for applications such as digital watermarking, ownership determination, and embedded covert messages. Innovative technology exists to embed data in a digital image that is retrievable, readable, but also irremovable and imperceptible. This section provides a survey of technology used to securely embed data in digital images for a wide range of applications including covert communication and conditional access rights. Example techniques are illustrated including least-significant-bit modification and discrete cosine transforms.
Abbreviations
- DCT:
-
Discrete cosine transform
- LSB:
-
Least significant bit of a binary number
- RGB:
-
A color represented as a combination of its red, green, and blue color channels; often used in reference to a pixel color that has 24-bits of precision with 8-bit channels for each of its red, green, and blue components
- YCrCb :
-
A representation of an RGB color in terms of its luminance (Y) and chrominance (Cr and Cb) components
References
Alhomoud A (2021) Image steganography in spatial domain: current status, techniques, and trends. Intell Autom Soft Comput 27:69–88
Baluja S (2017) Hiding images in plain sight: deep steganography. In: 31st conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 4–9 December 2017
Chandramouli R, Kharrazi M, Memon N (2004) Image steganography and steganalysis: concepts and practice. In: Kalker T, Cox I, Ro Y (eds) Digital watermarking. IWDW 2003. Lecture notes in computer science, vol 2939. Springer, Berlin/Heidelberg
Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analyses of current methods. Signal Process 90(3):727–752
Collins J, Agaian S (2016) High capacity image steganography using adjunctive numerical representations with multiple bit-plane decomposition methods. Int J Inf Secur 6(1):1–21
Cox I, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. In: Petitcolas F (ed) Information hiding. IH 2002. Lecture notes in computer science, vol 2578. Springer, Berlin/Heidelberg
Hamid N, Yahya A, Badlishah Ahmad R, Al-qershi M (2012) Image steganography techniques: an overview. Int J Comput Sci Secur 6(3)
Kaur H, Rani J (2016) A survey on different techniques of steganography. MATEC Web Con 57:02003
Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Fridrich J (ed) Information hiding. IH 2004. Lecture notes in computer science, vol 3200. Springer, Berlin/Heidelberg
Kharrazi M, Sencar H, Memon N (2004) Image steganography: concepts and practice. WSPC/lecture notes series 22
Krenn J (2004) Steganography and steganalysis. http://www.krenn.nl/univ/cry/steg/article.pdf. Accessed 2022
Lashkari A, Manaf A, Masrom M, Daud S (2011) A survey on image steganography algorithms and evaluation. In: Snasel V, Platos J, El-Qawasmeh E (eds) Digital information processing and communications. ICDIPC 2011. Communications in computer and information science, vol 188. Springer, Berlin/Heidelberg
Lee K, Westfeld A, Lee S (2006) Category attack for LSB steganalysis of JPEG images. In: Shi Y, Jeon B (eds) Digital watermarking. IWDW 2006. Lecture notes in computer science, vol 4283. Springer, Berlin/Heidelberg
Ming C, Ru Z, Xinxin N, Yixian Y (2006) Analysis of current steganography tools: classification & features. In: Intelligent Information Hiding and Multimedia Signal Processing, pp 384–387
Mohanty S, Ramakrishnan K, Kankanhalli M (2000) A DCT domain visible watermarking technique for images. IEEE Int Conf Multimedia 2:1029–1032
Moulin P, Mihcak M (2002) A framework for evaluating the data-hiding capacity of image sources. IEEE Trans Image Process 11(9):1029–1042
Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th USENIX security symposium, vol 10, pp 323–335
Provos N, Honeyman P (2003) Hide and Seek: an introduction to steganography. IEEE Secur Priv 1:32–44
Ruchi R, Ghanekar U (2020) A brief review on image steganography techniques. In: Proceedings of ICAEEC-2019, IIIT Allahabad, India, May 31–June 1 2019. SSRN Electron J
Sahu M (2015) Review of image steganography techniques in cloud security. Int J Recent Sci Res 2(2):21–25
Sumathi C, Santanam T, Umamaheswari G (2013) A study of various steganography techniques used for information hiding. Int J Comput Sci Eng Surv 4(6):9–25
Westerfeld A (2001) F5 – a steganographic algorithm: high capacity despite better steganalysis. In: Moskowitz I (ed) IH 2001. Lecture notes in computer science, vol 2137. Springer, Berlin/Heidelberg
Further Reading
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, Burlington
Katzenbeisser S (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood
Salomon D (2003) Data privacy and security. Springer, New York
Wayner P (2009) Information hiding: steganography & watermarking, 3rd edn. Morgan Kaufman, Burlington
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2023 Springer-Verlag GmbH Germany, part of Springer Nature
About this entry
Cite this entry
Taranovsky, D. (2023). Security Imaging: Data Hiding and Digital Watermarking. In: Blankenbach, K., Yan, Q., O'Brien, R.J. (eds) Handbook of Visual Display Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35947-7_31-3
Download citation
DOI: https://doi.org/10.1007/978-3-642-35947-7_31-3
Received:
Accepted:
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35947-7
Online ISBN: 978-3-642-35947-7
eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering
Publish with us
Chapter history
-
Latest
Security Imaging: Data Hiding and Digital Watermarking- Published:
- 20 January 2023
DOI: https://doi.org/10.1007/978-3-642-35947-7_31-3
-
Original
Security Imaging: Data Hiding and Digital Watermarking- Published:
- 12 June 2015
DOI: https://doi.org/10.1007/978-3-642-35947-7_31-2