Abstract
Steganography is the science of secret communication. It assumes if message is visible then it can be accessed. If it is invisible then it can never be in front of attack. So it hides the existence of message in an embedded image. As the awareness of privacy and security is increased by an individual, in government sector, security agencies and in some secret personal communication, the importance of steganography is also increasing. The characteristics of steganography like imperceptibility, robustness, high capacity separate it from other relevant methods like cryptography and watermarking. Here is the review of different techniques and state of the art methods done by the different scholars. These methodologies have described in different domains of steganography like spatial domain, frequency domain, discrete courier transform in frequency domain and adaptive domain. Every domain has its own characteristics. We analyzed various approaches in our survey and described their characteristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ghebleh, M.: A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simul. 19(6), 1898–1907 (2014)
Mohapatra, C.: A review on current methods and application of digital image steganography. Int. J. Multidiscip. Approach Stud. 2(2) (2015)
Swain, G.: Digital image steganography using variable length group of bits substitution. Proc. Comput. Sci. 85, 31–38 (2016)
Jain, M.: A review of digital image steganography using LSB and LSB array. Int. J. Appl. Eng. Res. 11(3), 1820–1824 (2016)
Yogi, N.: A survey on data conceal and protection in digital image (2016)
Garg, N.: Hybrid information security model for cloud storage systems using hybrid data security scheme (2016)
Kanan, H.R.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14), 6123–6130 (2014)
Roy, R.: Chaos based edge adaptive image steganography. Proc. Technol. 10, 138–146 (2013)
Nagaraj, V.: Color image steganography based on pixel value modification method using modulus function. IERI Proc. 4, 17–24 (2013)
Al-Shatnawi, A.M.: A new method in image steganography with improved image quality. Appl. Math. Sci. 6(79), 3907–3915 (2012)
Lin, G.S.: A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans. Multimed. 12(5), 345–357 (2010a)
Huang, F.: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Secur. 7(4), 1181–1191 (2012)
Premkumar, S., Narayanan, A.E.: Notice of violation of IEEE publication principles new visual steganography scheme for secure banking application. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1013–1016. IEEE (2012)
Sarreshtedari, S.: One-third probability embedding: a new±1 histogram compensating image least significant bit steganography scheme. IET Image Process. 8(2), 78–89 (2014)
Luo, W.: Security analysis on spatial 1 steganography for JPEG decompressed images. IEEE Sig. Process. Lett. 18(1), 39–42 (2011)
Guo, L., Ni, J.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)
Yu, C.M.: A distortion-free data hiding scheme for high dynamic range images. Displays 32(5), 225–236 (2011)
Wang, K.: A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(7), 1965–1975 (2013)
Qazanfari, K.: A new steganography method which preserves histogram: generalization of LSB++. Inf. Sci. 277, 90–101 (2014)
Wu, C.C.: A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84(12), 2196–2207 (2011)
Elshoura, S.M.: A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Sig. Process. Image Commun. 28(5), 531–552 (2013)
Amirtharajan, R.: An intelligent chaotic embedding approach to enhance stego-image quality. Inf. Sci. 193, 115–124 (2012)
Lou, D.C.: LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf. Sci. 188, 346–358 (2012)
Abduallah, W.: Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach. Comput. Electr. Eng. 40(4), 1390–1404 (2014)
Yuan, H.D.: Secret sharing with multi-cover adaptive steganography. Inf. Sci. 254, 197–212 (2014)
Swain, G., Lenka, S.K.: Steganography using the twelve square substitution cipher and an index variable. In: 2011 3rd International Conference on Electronics Computer Technology (ICECT), vol. 3, pp. 84–88. IEEE (2011)
Swain, G.: A robust image steganography technique using dynamic embedding with two least significant bits. In: Advanced Materials Research, vol. 403, pp. 835–841. Trans Tech Publications (2012)
Cheddad, A.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)
Hussain, M.: A survey of image steganography techniques (2013)
Riasat, R., Bajwa, I.S.: A hash-based approach for colour image steganography. In: 2011 International Conference on Computer Networks and Information Technology (ICCNIT), pp. 303–307. IEEE (2011)
Jafari, R.: Increasing image compression rate using steganography. Expert Syst. Appl. 40(17), 6918–6927 (2013)
Cheong, S.: Secure encrypted steganography graphical password scheme for near field communication smartphone access control system. Expert Syst. Appl. 41(7), 3561–3568 (2014)
Mao, Q.: A fast algorithm for matrix embedding steganography. Digit. Sig. Process. 25, 248–254 (2014)
Dasgupta, K.: Optimized video steganography using genetic algorithm (GA). Proc. Technol. 10, 131–137 (2013)
Cao, L., Jung, C.: Combining visual saliency and pattern masking for image steganography. In: 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 320–323. IEEE (2015)
Zielińska, E.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)
Wang, W.J.: VQ applications in steganographic data hiding upon multimedia images. IEEE Syst. J. 5(4), 528–537 (2011)
Tang, M.: A high capacity image steganography using multi-layer embedding. Optik-Int. J. Light Electron Optics 125(15), 3972–3976 (2014)
Ioannidou, A.: A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39(14), 11517–11524 (2012)
Biswas, D.: Digital image steganography using dithering technique. Proc. Technol. 4, 251–255 (2012)
Fan, L.: Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput. Electr. Eng. 39(3), 873–881 (2013)
Lin, P.Y.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887–1893 (2010b)
El-Emam, N.N.: New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465–1481 (2013)
Eslami, Z.: Secret image sharing based on cellular automata and steganography. Pattern Recogn. 43(1), 397–404 (2010)
Chakraborty, S.: Secret image sharing using grayscale payload decomposition and irreversible image steganography. J. Inf. Secur. Appl. 18(4), 180–192 (2013)
Eslami, Z.: Secret image sharing with authentication-chaining and dynamic embedding. J. Syst. Softw. 84(5), 803–809 (2011)
Geetha, S.: Varying radix numeral system based adaptive image steganography. Inf. Process. Lett. 111(16), 792–797 (2011)
Swain, G.: A dynamic approach to image steganography using the three least significant bits and extended hill cipher. In: Advanced Materials Research, vol. 403, pp. 842–849. Trans Tech Publications (2012)
Swain, G.: A technique for secret communication using a new block cipher with dynamic steganography. Int. J. Secur. Appl. 6(2), 1–12 (2012)
Das, R., Tuithung, T.: A novel steganography method for image based on Huffman encoding. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14–18. IEEE (2012)
Ramaiya, M.K., Hemrajani, N.: Security improvisation in image steganography using DES. In: 2013 IEEE 3rd International Advance Computing Conference (IACC), pp. 1094–1099. IEEE (2013)
Laskar, S.A.: High capacity data hiding using LSB steganography and encryption. Int. J. Database Manag. Syst. 4(6), 57 (2012)
Juneja, M., Sandhu, P.S.: An improved LSB based steganography with enhanced security and embedding/extraction. In: 3rd International Conference on Intelligent Computational Systems, Hong Kong, China (2013)
Ali, A.A.: Image steganography technique by using Braille method of blind people (LSBraille). Int. J. Image Process. (IJIP) 7(1), 81–89 (2013)
Gutte, R.S.: Steganography for two and three LSBS using extended substitution algorithm. ICTACT J. Commun. Technol. 4, 685–690 (2013)
Manjula, G. R.: A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aqeel, I., Suleman, M.B. (2019). A Survey on Digital Image Steganography Approaches. In: Bajwa, I., Kamareddine, F., Costa, A. (eds) Intelligent Technologies and Applications. INTAP 2018. Communications in Computer and Information Science, vol 932. Springer, Singapore. https://doi.org/10.1007/978-981-13-6052-7_66
Download citation
DOI: https://doi.org/10.1007/978-981-13-6052-7_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6051-0
Online ISBN: 978-981-13-6052-7
eBook Packages: Computer ScienceComputer Science (R0)