Skip to main content

A Survey on Various Crypto-steganography Techniques for Real-Time Images

  • Conference paper
  • First Online:
Intelligent Cyber Physical Systems and Internet of Things (ICoICI 2022)

Abstract

Information is the wealth of every organization and in the modern-day when information is shared digitally and via the internet, protecting this treasure has become a top issue. Private photographs need to be protected from unwanted access due to security concerns raised by internet photo transfers. Nowadays, practically everyone shares their personal information online, including photographs, either with other users or in a database that attracts cyber criminals who can use it to their benefit. Steganography can be as a security tool to safely transmit secret information because it is one such technique where the presence of a confidential message cannot be detected. This article compares various steganography techniques, including AES, LSB, DCT, DWT, etc. are compared them with each other and also more advanced techniques involving Cryptography and Steganography i.e., sharing secret data using counting-based s and matrix-based to increase security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Soni M, Khare A, Jain S (2014) A survey of digital image processing and its problems. 4:2250–3153

    Google Scholar 

  2. Rahmani MKI, Arora K, Pal N (2014) A crypto-steganography: a survey. 5(7)

    Google Scholar 

  3. Rao RM, Arora MK (2004) Overview of image processing. In: Advanced image processing techniques for remotely sensed hyperspectral data, pp 51–85

    Google Scholar 

  4. Billingsley FC (1970) Applications of digital image processing. Appl Opt 9(2):289–299

    Google Scholar 

  5. Saxena E, Goswami N (2014) Automatic object detection in image processing: a survey. 2:2321–8169

    Google Scholar 

  6. Huang TS, Aizawa K Image processing: some challenging problems. 21:9766–9769

    Google Scholar 

  7. Ahmad SS (2016) Steganography for inserting a message on the digital image using least significant bit and AES cryptographic algorithm. 1–6

    Google Scholar 

  8. Bhardwaj R, Khanna D (2015) Enhanced the security of image steganography through image encryption. 1–4

    Google Scholar 

  9. Deshmukh P (2016) An image encryption and decryption using AES algorithm. 7:2229–5518

    Google Scholar 

  10. Aparna VS, Rajana A, Jairaja I, Nandita B, Madhusoodanana P, Remya AAS (2020) Implementation of AES algorithm on text and image using MATLAB. 978-1-7281-4213-5

    Google Scholar 

  11. Zhang Y, Li X, Hou W (2017) A fast image encryption scheme based on AES. 978-1-5090-6238-6

    Google Scholar 

  12. Alsaffar DM, Sultan Almutiri A, Alqahtani B, Alamri RM, Fahhad Alqahtani H, Alqahtani NN, Mohammed alshammari G, Ali AA (2019) Image encryption based on AES and RSA algorithms. 978-1-5386-9439-8

    Google Scholar 

  13. Jain A, Sharma S (2019) A novel digital image encryption method based on RSA algorithm. 11. ISSN: 0973-7383

    Google Scholar 

  14. AL-Shaaby AA, AlKharobi T (2017) Cryptography and steganography: new approach. 5. ISSN: 2054-7420

    Google Scholar 

  15. Siper A, Farley R, LomBardo C (2005) The rise of steganography. Corpus ID: 110715828

    Google Scholar 

  16. Amarendra K, Mandhala VN, Gupta BC, Sudheshna GG, Anusha VV (2019) Image steganography using LSB. 8. ISSN: 2277-8616

    Google Scholar 

  17. Aggarwal A, Sangal A, Varshney A (2019) Image steganography using LSB algorithm. 11. ISSN: 0974-2255

    Google Scholar 

  18. Zhou Y, Wang C, Zhou X (2018) DCT-based color image compression algorithm using an efficient lossless encoder. ISSN: 2164-5221

    Google Scholar 

  19. Kumar YS, Kumar R, Kumar S (2020) 2D-Discrete cosine transform based dynamically controllable image compression technique. 978-1-7281-8911-6

    Google Scholar 

  20. Kumar SRS, Veeramachaneni S, Sk NM (2019) An efficient DFT implementation using modified group distributed arithmetic. 978-1-7281-1381-4

    Google Scholar 

  21. Kour P (2015) Image processing using discrete wavelet transform. 3. ISSN: 2321-5984

    Google Scholar 

  22. Thakral S, Manhas P (2019) Image processing by using different types of discrete wavelet transform. 499–507

    Google Scholar 

  23. Bisht A, Kumar A (2019) DWT chip design and FPGA synthesis for image processing. 8. ISSN: 2277-3878

    Google Scholar 

  24. Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. 5591–5619

    Google Scholar 

  25. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. https://doi.org/10.1007/s13319-019-0216-0

  26. Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. 7951–7985

    Google Scholar 

  27. Porwal S, Mittal S (2020) A threshold secret sharing technique based on matrix manipulation. 2214:020020

    Google Scholar 

  28. Al-Shaarani F, Gutub A (2021) Securing matrix counting-based secret-sharing involving crypto-steganography. https://doi.org/10.1016/j.jksuci.2021.09.009

  29. Vinothkanna MR (2019) A secure steganography creation algorithm for multiple file formats. J Innovative Image Process (JIIP) 1(01):20–30

    Google Scholar 

  30. Chatterjee R, Chakraborty R, Mondal JK (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wireless Syst 1(4):215–224

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Tanya Bindu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tanya Bindu, R., Kavitha, T. (2023). A Survey on Various Crypto-steganography Techniques for Real-Time Images. In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds) Intelligent Cyber Physical Systems and Internet of Things. ICoICI 2022. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-031-18497-0_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18497-0_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18496-3

  • Online ISBN: 978-3-031-18497-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics