Abstract
Information is the wealth of every organization and in the modern-day when information is shared digitally and via the internet, protecting this treasure has become a top issue. Private photographs need to be protected from unwanted access due to security concerns raised by internet photo transfers. Nowadays, practically everyone shares their personal information online, including photographs, either with other users or in a database that attracts cyber criminals who can use it to their benefit. Steganography can be as a security tool to safely transmit secret information because it is one such technique where the presence of a confidential message cannot be detected. This article compares various steganography techniques, including AES, LSB, DCT, DWT, etc. are compared them with each other and also more advanced techniques involving Cryptography and Steganography i.e., sharing secret data using counting-based s and matrix-based to increase security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Soni M, Khare A, Jain S (2014) A survey of digital image processing and its problems. 4:2250–3153
Rahmani MKI, Arora K, Pal N (2014) A crypto-steganography: a survey. 5(7)
Rao RM, Arora MK (2004) Overview of image processing. In: Advanced image processing techniques for remotely sensed hyperspectral data, pp 51–85
Billingsley FC (1970) Applications of digital image processing. Appl Opt 9(2):289–299
Saxena E, Goswami N (2014) Automatic object detection in image processing: a survey. 2:2321–8169
Huang TS, Aizawa K Image processing: some challenging problems. 21:9766–9769
Ahmad SS (2016) Steganography for inserting a message on the digital image using least significant bit and AES cryptographic algorithm. 1–6
Bhardwaj R, Khanna D (2015) Enhanced the security of image steganography through image encryption. 1–4
Deshmukh P (2016) An image encryption and decryption using AES algorithm. 7:2229–5518
Aparna VS, Rajana A, Jairaja I, Nandita B, Madhusoodanana P, Remya AAS (2020) Implementation of AES algorithm on text and image using MATLAB. 978-1-7281-4213-5
Zhang Y, Li X, Hou W (2017) A fast image encryption scheme based on AES. 978-1-5090-6238-6
Alsaffar DM, Sultan Almutiri A, Alqahtani B, Alamri RM, Fahhad Alqahtani H, Alqahtani NN, Mohammed alshammari G, Ali AA (2019) Image encryption based on AES and RSA algorithms. 978-1-5386-9439-8
Jain A, Sharma S (2019) A novel digital image encryption method based on RSA algorithm. 11. ISSN: 0973-7383
AL-Shaaby AA, AlKharobi T (2017) Cryptography and steganography: new approach. 5. ISSN: 2054-7420
Siper A, Farley R, LomBardo C (2005) The rise of steganography. Corpus ID: 110715828
Amarendra K, Mandhala VN, Gupta BC, Sudheshna GG, Anusha VV (2019) Image steganography using LSB. 8. ISSN: 2277-8616
Aggarwal A, Sangal A, Varshney A (2019) Image steganography using LSB algorithm. 11. ISSN: 0974-2255
Zhou Y, Wang C, Zhou X (2018) DCT-based color image compression algorithm using an efficient lossless encoder. ISSN: 2164-5221
Kumar YS, Kumar R, Kumar S (2020) 2D-Discrete cosine transform based dynamically controllable image compression technique. 978-1-7281-8911-6
Kumar SRS, Veeramachaneni S, Sk NM (2019) An efficient DFT implementation using modified group distributed arithmetic. 978-1-7281-1381-4
Kour P (2015) Image processing using discrete wavelet transform. 3. ISSN: 2321-5984
Thakral S, Manhas P (2019) Image processing by using different types of discrete wavelet transform. 499–507
Bisht A, Kumar A (2019) DWT chip design and FPGA synthesis for image processing. 8. ISSN: 2277-3878
Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. 5591–5619
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. https://doi.org/10.1007/s13319-019-0216-0
Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. 7951–7985
Porwal S, Mittal S (2020) A threshold secret sharing technique based on matrix manipulation. 2214:020020
Al-Shaarani F, Gutub A (2021) Securing matrix counting-based secret-sharing involving crypto-steganography. https://doi.org/10.1016/j.jksuci.2021.09.009
Vinothkanna MR (2019) A secure steganography creation algorithm for multiple file formats. J Innovative Image Process (JIIP) 1(01):20–30
Chatterjee R, Chakraborty R, Mondal JK (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wireless Syst 1(4):215–224
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tanya Bindu, R., Kavitha, T. (2023). A Survey on Various Crypto-steganography Techniques for Real-Time Images. In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds) Intelligent Cyber Physical Systems and Internet of Things. ICoICI 2022. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-031-18497-0_28
Download citation
DOI: https://doi.org/10.1007/978-3-031-18497-0_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18496-3
Online ISBN: 978-3-031-18497-0
eBook Packages: EngineeringEngineering (R0)