Skip to main content

A Survey on Digital Image Steganography Approaches

  • Conference paper
  • First Online:
Intelligent Technologies and Applications (INTAP 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 932))

Included in the following conference series:

Abstract

Steganography is the science of secret communication. It assumes if message is visible then it can be accessed. If it is invisible then it can never be in front of attack. So it hides the existence of message in an embedded image. As the awareness of privacy and security is increased by an individual, in government sector, security agencies and in some secret personal communication, the importance of steganography is also increasing. The characteristics of steganography like imperceptibility, robustness, high capacity separate it from other relevant methods like cryptography and watermarking. Here is the review of different techniques and state of the art methods done by the different scholars. These methodologies have described in different domains of steganography like spatial domain, frequency domain, discrete courier transform in frequency domain and adaptive domain. Every domain has its own characteristics. We analyzed various approaches in our survey and described their characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ghebleh, M.: A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simul. 19(6), 1898–1907 (2014)

    Google Scholar 

  • Mohapatra, C.: A review on current methods and application of digital image steganography. Int. J. Multidiscip. Approach Stud. 2(2) (2015)

    Google Scholar 

  • Swain, G.: Digital image steganography using variable length group of bits substitution. Proc. Comput. Sci. 85, 31–38 (2016)

    Google Scholar 

  • Jain, M.: A review of digital image steganography using LSB and LSB array. Int. J. Appl. Eng. Res. 11(3), 1820–1824 (2016)

    Google Scholar 

  • Yogi, N.: A survey on data conceal and protection in digital image (2016)

    Google Scholar 

  • Garg, N.: Hybrid information security model for cloud storage systems using hybrid data security scheme (2016)

    Google Scholar 

  • Kanan, H.R.: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14), 6123–6130 (2014)

    Google Scholar 

  • Roy, R.: Chaos based edge adaptive image steganography. Proc. Technol. 10, 138–146 (2013)

    Google Scholar 

  • Nagaraj, V.: Color image steganography based on pixel value modification method using modulus function. IERI Proc. 4, 17–24 (2013)

    Google Scholar 

  • Al-Shatnawi, A.M.: A new method in image steganography with improved image quality. Appl. Math. Sci. 6(79), 3907–3915 (2012)

    Google Scholar 

  • Lin, G.S.: A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans. Multimed. 12(5), 345–357 (2010a)

    Google Scholar 

  • Huang, F.: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Secur. 7(4), 1181–1191 (2012)

    Google Scholar 

  • Premkumar, S., Narayanan, A.E.: Notice of violation of IEEE publication principles new visual steganography scheme for secure banking application. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1013–1016. IEEE (2012)

    Google Scholar 

  • Sarreshtedari, S.: One-third probability embedding: a new±1 histogram compensating image least significant bit steganography scheme. IET Image Process. 8(2), 78–89 (2014)

    Google Scholar 

  • Luo, W.: Security analysis on spatial 1 steganography for JPEG decompressed images. IEEE Sig. Process. Lett. 18(1), 39–42 (2011)

    Google Scholar 

  • Guo, L., Ni, J.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)

    Google Scholar 

  • Yu, C.M.: A distortion-free data hiding scheme for high dynamic range images. Displays 32(5), 225–236 (2011)

    Google Scholar 

  • Wang, K.: A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(7), 1965–1975 (2013)

    Google Scholar 

  • Qazanfari, K.: A new steganography method which preserves histogram: generalization of LSB++. Inf. Sci. 277, 90–101 (2014)

    Google Scholar 

  • Wu, C.C.: A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84(12), 2196–2207 (2011)

    Google Scholar 

  • Elshoura, S.M.: A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Sig. Process. Image Commun. 28(5), 531–552 (2013)

    Google Scholar 

  • Amirtharajan, R.: An intelligent chaotic embedding approach to enhance stego-image quality. Inf. Sci. 193, 115–124 (2012)

    Google Scholar 

  • Lou, D.C.: LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf. Sci. 188, 346–358 (2012)

    Google Scholar 

  • Abduallah, W.: Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach. Comput. Electr. Eng. 40(4), 1390–1404 (2014)

    Google Scholar 

  • Yuan, H.D.: Secret sharing with multi-cover adaptive steganography. Inf. Sci. 254, 197–212 (2014)

    Google Scholar 

  • Swain, G., Lenka, S.K.: Steganography using the twelve square substitution cipher and an index variable. In: 2011 3rd International Conference on Electronics Computer Technology (ICECT), vol. 3, pp. 84–88. IEEE (2011)

    Google Scholar 

  • Swain, G.: A robust image steganography technique using dynamic embedding with two least significant bits. In: Advanced Materials Research, vol. 403, pp. 835–841. Trans Tech Publications (2012)

    Google Scholar 

  • Cheddad, A.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)

    Google Scholar 

  • Hussain, M.: A survey of image steganography techniques (2013)

    Google Scholar 

  • Riasat, R., Bajwa, I.S.: A hash-based approach for colour image steganography. In: 2011 International Conference on Computer Networks and Information Technology (ICCNIT), pp. 303–307. IEEE (2011)

    Google Scholar 

  • Jafari, R.: Increasing image compression rate using steganography. Expert Syst. Appl. 40(17), 6918–6927 (2013)

    Google Scholar 

  • Cheong, S.: Secure encrypted steganography graphical password scheme for near field communication smartphone access control system. Expert Syst. Appl. 41(7), 3561–3568 (2014)

    Google Scholar 

  • Mao, Q.: A fast algorithm for matrix embedding steganography. Digit. Sig. Process. 25, 248–254 (2014)

    Google Scholar 

  • Dasgupta, K.: Optimized video steganography using genetic algorithm (GA). Proc. Technol. 10, 131–137 (2013)

    Google Scholar 

  • Cao, L., Jung, C.: Combining visual saliency and pattern masking for image steganography. In: 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 320–323. IEEE (2015)

    Google Scholar 

  • ZieliÅ„ska, E.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)

    Google Scholar 

  • Wang, W.J.: VQ applications in steganographic data hiding upon multimedia images. IEEE Syst. J. 5(4), 528–537 (2011)

    Google Scholar 

  • Tang, M.: A high capacity image steganography using multi-layer embedding. Optik-Int. J. Light Electron Optics 125(15), 3972–3976 (2014)

    Google Scholar 

  • Ioannidou, A.: A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39(14), 11517–11524 (2012)

    Google Scholar 

  • Biswas, D.: Digital image steganography using dithering technique. Proc. Technol. 4, 251–255 (2012)

    Google Scholar 

  • Fan, L.: Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput. Electr. Eng. 39(3), 873–881 (2013)

    Google Scholar 

  • Lin, P.Y.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887–1893 (2010b)

    Google Scholar 

  • El-Emam, N.N.: New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465–1481 (2013)

    Google Scholar 

  • Eslami, Z.: Secret image sharing based on cellular automata and steganography. Pattern Recogn. 43(1), 397–404 (2010)

    Google Scholar 

  • Chakraborty, S.: Secret image sharing using grayscale payload decomposition and irreversible image steganography. J. Inf. Secur. Appl. 18(4), 180–192 (2013)

    Google Scholar 

  • Eslami, Z.: Secret image sharing with authentication-chaining and dynamic embedding. J. Syst. Softw. 84(5), 803–809 (2011)

    Google Scholar 

  • Geetha, S.: Varying radix numeral system based adaptive image steganography. Inf. Process. Lett. 111(16), 792–797 (2011)

    Google Scholar 

  • Swain, G.: A dynamic approach to image steganography using the three least significant bits and extended hill cipher. In: Advanced Materials Research, vol. 403, pp. 842–849. Trans Tech Publications (2012)

    Google Scholar 

  • Swain, G.: A technique for secret communication using a new block cipher with dynamic steganography. Int. J. Secur. Appl. 6(2), 1–12 (2012)

    Google Scholar 

  • Das, R., Tuithung, T.: A novel steganography method for image based on Huffman encoding. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14–18. IEEE (2012)

    Google Scholar 

  • Ramaiya, M.K., Hemrajani, N.: Security improvisation in image steganography using DES. In: 2013 IEEE 3rd International Advance Computing Conference (IACC), pp. 1094–1099. IEEE (2013)

    Google Scholar 

  • Laskar, S.A.: High capacity data hiding using LSB steganography and encryption. Int. J. Database Manag. Syst. 4(6), 57 (2012)

    Google Scholar 

  • Juneja, M., Sandhu, P.S.: An improved LSB based steganography with enhanced security and embedding/extraction. In: 3rd International Conference on Intelligent Computational Systems, Hong Kong, China (2013)

    Google Scholar 

  • Ali, A.A.: Image steganography technique by using Braille method of blind people (LSBraille). Int. J. Image Process. (IJIP) 7(1), 81–89 (2013)

    Google Scholar 

  • Gutte, R.S.: Steganography for two and three LSBS using extended substitution algorithm. ICTACT J. Commun. Technol. 4, 685–690 (2013)

    Google Scholar 

  • Manjula, G. R.: A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674 (2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imra Aqeel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aqeel, I., Suleman, M.B. (2019). A Survey on Digital Image Steganography Approaches. In: Bajwa, I., Kamareddine, F., Costa, A. (eds) Intelligent Technologies and Applications. INTAP 2018. Communications in Computer and Information Science, vol 932. Springer, Singapore. https://doi.org/10.1007/978-981-13-6052-7_66

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6052-7_66

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6051-0

  • Online ISBN: 978-981-13-6052-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics