Advertisement

Steganography Techniques

  • Abid Yahya
Chapter

Abstract

This chapter reviews the main steganographic methods for both lossy and lossless image formats, such as JPEG and BMP. The values are presented in terms of a taxonomy that focuses on three principal steganographic techniques for hiding information in image files. Those practices comprise of those modifying the image in the spatial domain, in the transform domain, and those modifying the image file formatting. Each of these systems tries to satisfy the three most important aspects of steganographic design (imperceptibility or undetectability, capacity, and robustness). It is possible to defeat the transform domain methods by employing some efforts. With most of the steganography applications, the JPEG file format can be used, particularly with images that have to be communicated over an open system environment, like that of the Internet. Thus, for an agent to send secret information using steganographic methods, s/he must select an appropriate steganographic algorithm and cover-image.

References

  1. Abdelwahab, A. A., & Hassaan, L. A. (2008, 18–20 March 2008). A discrete wavelet transform based technique for image data hiding. Paper presented at the radio science conference, 2008. NRSC 2008. National.Google Scholar
  2. Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.CrossRefGoogle Scholar
  3. Afrakhteh, M., & Ibrahim, S. (2010, 25–27 June 2010). Adaptive steganography scheme using more surrounding pixels. Paper presented at the Internatioal Conference on Computer Design and Applications (ICCDA), 2010.Google Scholar
  4. Alturki, F., & Mersereau, R. (2001, 7–10 Oct 2001). Secure blind image steganographic technique using discrete Fourier transformation. Paper presented at the International Conference on Image Processing, 2001. Proceedings.Google Scholar
  5. Amirtharajan, R., & Rayappan, J. B. B. (2012). Inverted pattern in inverted time domain for icon steganography. Information Technology Journal, 11(5), 587–595.CrossRefGoogle Scholar
  6. Anand, D., & Niranjan, U. C. (1998, 29 Oct–1 Nov 1998). Watermarking medical images with patient information. Paper presented at the Engineering in Medicine and Biology Society, 1998. Proceedings of the 20th Annual International Conference of the IEEE.Google Scholar
  7. Anderson, R. J., & Petitcolas, F. A. P. (2006). On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4), 474–481.CrossRefGoogle Scholar
  8. Areepongsa, S., Kaewkamnerd, N., Syed, Y. F., & Rao, K. R. (2000). Exploring steganography for low bit rate wavelet based coder in image retrieval system. Paper presented at the TENCON 2000. Proceedings.Google Scholar
  9. Areepongsa, S., Syed, Y. F., Kaewkamnerd, N., & Rao, K. R. (2000). Steganography for a low bit-rate wavelet based image coder. Paper presented at the International Conference on Image Processing, 2000. Proceedings.Google Scholar
  10. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.CrossRefGoogle Scholar
  11. Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F. J., & Pogreb, S. (2000). Applications for data hiding. IBM Systems Journal, 39(3–4), 547–568.CrossRefGoogle Scholar
  12. Böhme, R., & Westfeld, A. (2004). Breaking Cauchy model-based JPEG steganography with first order statistics. In P. Samarati, P. Ryan, D. Gollmann, & R. Molva (Eds.), Computer security – ESORICS 2004 (Vol. 3193, pp. 125–140). Berlin/Heidelberg: Springer.CrossRefGoogle Scholar
  13. Böhme, R., & Westfeld, A. (2005). Exploiting preserved statistics for steganalysis Springer Science & Business Media. ISBN 364214313X, 9783642143137.Google Scholar
  14. Chandramouli, R., Kharrazi, M., & Memon, N. (2004). Image steganography and steganalysis: Concepts and practice Lecture notes in computer science (Vol. 2939). Berlin, Heidelberg: Springer.Google Scholar
  15. Chang, C.-C., & Tseng, H.-W. (2004). A steganographic method for digital images using side match. Pattern Recognition Letters, 25(12), 1431–1437.CrossRefGoogle Scholar
  16. Chang, C.-C., Tsai, P., & Lin, M.-H. (2004). An adaptive steganography for index-based images using codeword grouping. Paper presented at the Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing – Volume Part III, Tokyo, Japan.Google Scholar
  17. Cheddad, A. (2009). Steganoflage: A new image steganography algorithm. Doctor of Philosophy Thesis, University of Ulster, Northern Ireland, UK.Google Scholar
  18. Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2008a, March 31–April 4). Biometric Inspired Digital Image Steganography. Paper presented at 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), 2008.Google Scholar
  19. Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2008b, 28–30 May). Enhancing Steganography in Digital Images. Paper presented at the Canadian Conference on Computer and Robot Vision, 2008. CRV '08.Google Scholar
  20. Cheddad, A., Condell, J., Curran, K., & McKevitt, P. M. (2009a). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89(12), 2324–2332.CrossRefGoogle Scholar
  21. Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2009b). A skin tone detection algorithm for an adaptive approach to steganography. Signal Processing, 89(12), 2465–2478.CrossRefGoogle Scholar
  22. Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.CrossRefGoogle Scholar
  23. Chen, M.-C. (2010). Image security and recognition system. Ph.D. dissertation, the University of Texas at San Antonio, Texas, United States.Google Scholar
  24. Chen, W.-Y. (2007). Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Applied Mathematics and Computation, 185(1), 432–448.MathSciNetCrossRefGoogle Scholar
  25. Chih-Hsuan, T., Zhi-Fang, Y., & Wen-Hsiang, T. (2004). Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Transactions on Communications, 52(5), 791–800.CrossRefGoogle Scholar
  26. Drew, M. S., & Bergner, S. (2008). Spatio-chromatic decorrelation for color image compression. Image Communication, 23(8), 599–609.Google Scholar
  27. EC Council. (2010). Attack phases. EC Council Press. Clifton Park, NY: Course Technology/Cengage Learning.Google Scholar
  28. El-Emam, N. N. (2007). Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science, 3(4), 223–232.CrossRefGoogle Scholar
  29. England, N. (1997). New image generation techniques. Computer Graphics and Applications, IEEE, 17(1), 39–39.CrossRefGoogle Scholar
  30. Farid, H. (2009). Image forgery detection. Signal Processing Magazine IEEE, 26(2), 16–25.CrossRefGoogle Scholar
  31. Fridrich, J. (1999). Applications of data hiding in digital images. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999, ISSPA ‘99. Australia.Google Scholar
  32. Fridrich, J., & Goljan, M. (2002). Practical steganalysis of digital images - state of the art. Electronic Imaging, 19–25 January 2002, San Jose, California, United States.Google Scholar
  33. Fridrich, J., Goljan, M., & Hogea, D. (2003). Steganalysis of JPEG images: Breaking the F5 algorithm lecture notes in computer science (Vol. 2578). Berlin, Heidelberg: Springer.MATHGoogle Scholar
  34. Fridrich, J., Goljan, M., & Rui, D. (2001). Detecting LSB steganography in color, and gray-scale images. MultiMedia, IEEE, 8(4), 22–28.CrossRefGoogle Scholar
  35. Geetha, S., Kabilan, V., Chockalingam, S. P., & Kamaraj, N. (2011). Varying radix numeral system based adaptive image steganography. Information Processing Letters, 111(16), 792–797.MathSciNetCrossRefGoogle Scholar
  36. Gkizeli, M., Pados, D. A., & Medley, M. J. (2007). Optimal signature design for spread-spectrum steganography. IEEE Transactions on Image Processing, 16(2), 391–405.MathSciNetCrossRefGoogle Scholar
  37. Hamid, N., Yahya, A., & Ahmad, R. B. (2011a). Performance analysis of image steganography techniques. Paper presented at AKEPT’s 1st annual young researchers conference (AYRC X32011), Kuala Lumpur, Malaysia.Google Scholar
  38. Hamid, N., Yahya, A., & Ahmad, R. B. (2011b, 22–23 October). An overview of image steganography techniques. Paper presented at the International Postgraduate Conference on Engineering (IPCE2011), Perlis, Malaysia.Google Scholar
  39. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a, 10–12 April). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st IEEE International Conference on Future Communication Network (ICFCN’12). Iraq, Baghdad.Google Scholar
  40. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b). Secured and Robust Information Hiding Scheme. Paper presented at the Malaysian Technical Universities Conference on Engineering and Technology (MUCET2012), Kangar, Perlis, Malaysia.Google Scholar
  41. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012c, 18–20 June). Blind image steganography scheme using speeded-up robust features technique. Paper presented at the 2nd International Malaysia-Ireland joint symposium on engineering, science and business (IMiEJS2012), Kuala Lumpur, Malaysia.Google Scholar
  42. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012d). An improved robust and secured image Steganographic scheme. International Journal of Electronics and Communication Engineering & Technology (IJECET), 3(2), 484–496.Google Scholar
  43. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012e). A comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues (IJCSI), 9(3), 110–116.Google Scholar
  44. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012f). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.Google Scholar
  45. Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences., 7(1), 35–55.Google Scholar
  46. Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.Google Scholar
  47. Hashad, A. I., Madani, A. S., & Wahdan, A. E. M. A. (2005, 5–6 Dec 2005). A robust steganography technique using discrete cosine transform insertion. Paper presented at the ITI 3rd International Conference on Information and Communications Technology, 2005. Enabling technologies for the new knowledge society.Google Scholar
  48. Hernandez-Castro, J. C., Blasco-Lopez, I., Estevez-Tapiador, J. M., & Ribagorda-Garnacho, A. (2006). Steganography in games: A general methodology and its application to the game of Go. Computers and Security, 25(1), 64–71.CrossRefGoogle Scholar
  49. Information Hiding. In J. Fridrich (Ed.), (Vol. 3200, pp. 359–379). Berlin/Heidelberg: Springer.Google Scholar
  50. Jamil, T. (1999). Steganography: The art of hiding information in plain sight. Potentials IEEE, 18(1), 10–12.CrossRefGoogle Scholar
  51. Johnson, N. F. (1995). Steganography. Technical report. Retrieved August 24, 2012.Google Scholar
  52. Johnson, N. F. (2009, 2011). Steganography software. Retrieved August 26, 2012.Google Scholar
  53. Johnson, N. F., & Katzenbeisser, S. (2000). A survey of steganographic techniques. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 43–78). London: Artech House.Google Scholar
  54. Johnson, N., & Jajodia, S. (1998). Steganalysis of images created using current steganography software CrossRefGoogle Scholar
  55. Judge, J. C. (2001). Steganography: Past, present, future. Retrieved August 24, 2012Google Scholar
  56. Jun, K., Hongru, J., Xiaolu, L., & Zhi, Q. (2009, 22–24 Jan). A novel content-based information hiding scheme. Paper presented at theInternational Conference on Computer Engineering and Technology, 2009. ICCET ’09.Google Scholar
  57. Juneja, M., & Sandhu, P. S. (2009, 27–28 Oct). Designing of robust image steganography technique based on LSB insertion and encryption.Paper presented at theInternational Conference on Advances in Recent Technologies in Communication and Computing, 2009. ARTCom ’09.Google Scholar
  58. Katzenbeisser, S. C. (2000). Principles of steganography. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 17–41). Boston/London: Artech House.Google Scholar
  59. Kekre, H. B., Mishra, D., Shah, S., Shah, R., & Thakkar, C. (2012). Row-wise DCT plane sectorization in CBIR. International Journal of Computer Applications, 46(4), 29–35.Google Scholar
  60. Kermani, Z. Z., & Jamzad, M. (2005, December 21-21). A robust steganography algorithm based on texture similarity using Gabor filter. Paper presented at the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005. Proceedings.Google Scholar
  61. Kharrazi, M. (2006). Image steganography and steganalysis. PhD Dissertation, Polytechnic University, (30250643).Google Scholar
  62. Ki-Hyun, J., Kyeoung-Ju, H., & Kee-Young, Y. (2008, August 28–30). Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods. Paper presented at theInternational Conference on Convergence and Hybrid Information Technology, 2008. ICHIT ’08.Google Scholar
  63. Kruus, P., Scace, C., Heyman, M., & Mundy, M. (2003). A survey of steganographic techniques for image files. Advanced Security Research Journal, V(I), 41–52.Google Scholar
  64. Li, X., & Wang, J. (2007). A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Science., 177(15), 3099–3109.CrossRefGoogle Scholar
  65. Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142–172.Google Scholar
  66. Liao, X., Wen, Q.-y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1–8.CrossRefGoogle Scholar
  67. Lin, C.-C., & Shiu, P.-F. (2010). High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing, 1(3), 220–240.Google Scholar
  68. Lin, Y.-K. (2012). High capacity reversible data hiding scheme based upon discrete cosine transformation. Journal of Systems and Software, 85(10), 2395–2404. https://doi.org/10.1016/j.jss.2012.05.032 CrossRefGoogle Scholar
  69. Low, S. H., Maxemchuk, N. F., Brassil, J. T., & O’Gorman, L. (1995, 2–6 Apr 1995). Document marking and identification using both line and word shifting. Paper presented at the INFOCOM ‘95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Boston, Massachusetts.Google Scholar
  70. Low, S. H., & Maxemchuk, N. F. (1998). Performance comparison of two text marking methods. IEEE Journal on Selected Areas in Communications, 16(4), 561–572.CrossRefGoogle Scholar
  71. Low, S. H., Maxemchuk, N. F., & Lapone, A. M. (1998). Document identification for copyright protection using centroid detection. IEEE Transactions on Communications, 46(3), 372–383.CrossRefGoogle Scholar
  72. Lu, C.-S. (2005). Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Hershey, Pennsylvania: Idea Group Publishing.CrossRefGoogle Scholar
  73. Marvel, L. M., Boncelet Jr., C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075–1083.CrossRefGoogle Scholar
  74. Marvel, L. M., Retter, C. T., & Boncelet, C. G., Jr. (1998a, 4–7 Oct). Hiding information in images. Paper presented at the International Conference on Image Processing, 1998. ICIP 98. Proceedings.Google Scholar
  75. Marvel, L. M., Retter, C. T., & Boncelet, C. G., Jr. (1998b, 18–21 Oct). A methodology for data hiding using images. Paper presented at the Military Communications Conference, 1998. MILCOM98. Proceedings., IEEE.Google Scholar
  76. Morkel, T., Eloff, J. H. P., & Olivier, M. S. (2005). An overview of image steganography.Paper presented at the Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa.Google Scholar
  77. Noda, H., Niimi, M., & Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters, 27(5), 455–461.CrossRefGoogle Scholar
  78. Park, Y.-R., Kang, H.-H., Shin, S.-U., & Kwon, K.-R. (2005). A steganographic scheme in digital images using information of neighboring pixels. Advances in natural computation. ICNC 2005. Lecture notes in computer science (Vol. 3612). Berlin, Heidelberg: Springer.Google Scholar
  79. Paulson, L. D. (2006). News briefs. Computer, 39(8), 25–27.CrossRefGoogle Scholar
  80. Petitcolas, F. A. P. (2000). Introduction to information hiding. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 1–12). Boston/London: Artech House.Google Scholar
  81. Pickholtz, R., Schilling, D., & Milstein, L. (1982). Theory of spread-spectrum communications—atutorial. IEEE Transactions on Communications, 30(5), 855–884.CrossRefGoogle Scholar
  82. Pitas, I. (1996, 16–19 Sep). A method for signature casting on digital images. Paper presented at the International Conference on Image Processing, 1996. Proceedings.Google Scholar
  83. Potdar, V. M., Han, S., & Chang, E. (2005, 10–12 Aug). A survey of digital image watermarking techniques. Paper presented at the 3rd IEEE International Conference on Industrial Informatics, 2005. INDIN ’05.Google Scholar
  84. Prasad, M. S., Janeyulu, S. N., Krishna, C. G., & Nagaraju, C. (2009). A novel information hiding technique for security by using image steganography. Journal of Theoretical and Applied Information Technology, 8(1), 35–39.Google Scholar
  85. Provos, N. (2001). Defending against statistical steganalysis. Paper presented at the Proceedings of the 10th conference on USENIX Security Symposium – Volume 10, Washington, D.C.Google Scholar
  86. Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32–44.CrossRefGoogle Scholar
  87. Radhakrishnan, R., Shanmugasundaram, K., & Memon, N. (2002, 9–11 Dec). Data masking: a secure-covert channel paradigm. Paper presented at the IEEE Workshop on Multimedia Signal Processing, 2002.Google Scholar
  88. Reddy, H. S. M., & Raja, K. B. (2009). High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security (IJCSS), 3(6), 462–472.Google Scholar
  89. Rodriguez, B. M., II. (2008). Multi-class classification for identifying JPEG steganography embedding methods. Ph.D. dissertation, Air Force Institute of Technology, Ohio, United States.Google Scholar
  90. Sallee, P. (2004). Model-Based Steganography Digital Watermarking. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg.CrossRefGoogle Scholar
  91. Samaratunge, S. G. K. D. N. (2007). New steganography technique for palette based images International Conference on Industrial and Information Systems, 2007. ICIIS 2007, Sri LankaGoogle Scholar
  92. Sandford Ii, M. T., Bradley, J. N., & Handel, T. G. (1996). Data embedding method. 226–259.Google Scholar
  93. Shaou-Gang, M., Chin-Ming, H., Yuh-Show, T., & Hui-Mei, C. (2000). A secure data hiding technique with heterogeneous data-combining capability for electronic patient records. Paper presented at the Engineering in Medicine and Biology Society, 2000. Proceedings of the 22nd Annual International Conference of the IEEE.Google Scholar
  94. Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16–22.CrossRefGoogle Scholar
  95. Shen, C., Zhang, H., Feng, D., Cao, Z., & Huang, J. (2007). Survey of information security. Science in China Series F: Information Sciences, 50(3), 273–298.CrossRefGoogle Scholar
  96. Shih, F. Y. (2007). Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, FL: Taylor & Francis.Google Scholar
  97. Singh, R. P., Khan, M. A. A., Khan, M., & Singh, N. (2010). Spread spectrum image steganography in multimedia messaging service of mobile phones. International Journal of Electronics Engineering, 2(2), 365–369.Google Scholar
  98. Smith, J. R., & Comiskey, B. O. (1996). Modulation and information hiding in images. Paper presented at the Proceedings of the First International Workshop on Information Hiding.CrossRefGoogle Scholar
  99. Solanki, K., Sarkar, A., & Manjunath, B. S. (2007). YASS: Yet another steganographic scheme that resists blind steganalysis. Paper presented at the Proceedings of the 9th international conference on Information hiding, Saint Malo, France.CrossRefGoogle Scholar
  100. Syed, Y. F. (1999). A low bit rate wavelet-based image coder for transmission over hybrid networks. The University of Texas at Arlington.Google Scholar
  101. Syed, Y. F., & Rao, K. R. (1999, 24–27 Oct). Scalable low bit rate coding using an HC-RIOT coder. Paper presented at the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1999. Conference Record.Google Scholar
  102. Tzschoppe, R., Baeuml, R., Huber, J., & Kaup, A. (2003). Steganographic system based on higher-order statistics. Paper presented at the Security and Watermarking of Multimedia Contents V, Santa Clara, California, USA.Google Scholar
  103. Wang, C.-M., Wu, N.-I., Tsai, C.-S., & Hwang, M.-S. (2008). A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software, 81(1), 150–158.CrossRefGoogle Scholar
  104. Wayner, P. (2002). Disappearing cryptography information hiding: Steganography & watermarking. San Francisco: Morgan Kaufmann Publishers Inc ©2002 ISBN:1558607692.Google Scholar
  105. Westfeld, A. (2001). F5—a steganographic algorithm: High capacity despite better steganalysis. Paper presented at the 4th International Workshop on Information Hiding Lecture Notes in Computer Science, Vol. 2137. Springer, Berlin, Heidelberg.CrossRefGoogle Scholar
  106. Westfeld, A., & Pfitzmann, A. (2000). Attacks on Steganographic systems. Lecture notes in computer science, Vol 1768. Berlin, Heidelber: Springer.CrossRefGoogle Scholar
  107. Widadi, K. C., Ainianta, P. H., & Chan Choong, W. (2005). Blind steganography using direct sequence/frequency hopping spread spectrum technique. Paper presented at the Fifth International Conference on Information, Communications and Signal Processing, 2005 Bangkok, Thailand.Google Scholar
  108. Wu, D.-C., & Tsai, W.-H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613–1626.CrossRefGoogle Scholar
  109. Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings - Vision, Image and Signal Processing, 152(5), 611–615.CrossRefGoogle Scholar
  110. Xuefeng, W., Then, Y., & Chang-Tsun, L. (2005, 11–14 Sept). A palette-based image steganographic method using colour quantisation. Paper presented at the IEEE International Conference onimage processing, 2005. ICIP 2005 Genova, Italy.Google Scholar
  111. Yang, C.-H., & Wang, S.-J. (2006). A steganographic method for digital images by multi-pixel differencing. Paper presented at the International Computer Symposium, Taipei, Taiwan.Google Scholar
  112. Yesna, Y., Karen, P., & Sos, A. (2007). New quantization matrices for JPEG steganography. Paper presented at the Mobile Multimedia/Image Processing for Military and Security Applications 2007, USA.Google Scholar
  113. Yi-Ta, W., & Shih, F. Y. (2006). Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 36(1), 24–31.CrossRefGoogle Scholar
  114. Yu, L., Zhao, Y., Ni, R., & Zhu, Z. (2008). PM1 steganography in JPEG images using genetic algorithm. Soft Computing, 13(4), 393–400.CrossRefGoogle Scholar
  115. Yu, Y.-H., Chang, C.-C., & Lin, I.-C. (2007). A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding, 107(3), 183–194.CrossRefGoogle Scholar
  116. Yue, L., Chang-Tsun, L., & Chia-Hung, W. (2007, 29–31 Aug). Protection of mammograms using blind steganography and watermarking. Paper presented at the Third international symposium on Information Assurance and Security, 2007. IAS 2007 Manchester, UK.Google Scholar
  117. Yu-Kuen, H., Mei-Yi, W., & Jia-Hong, L. (2002). Hierarchic texture classification using statistical steganography techniques. Paper presented at the 14th International Conference on Digital Signal Processing, 2002. DSP 2002 Santorini, Greece, Greece.Google Scholar
  118. Zamani, M., Manaf, A. B. A., & Abdullah, S. M. (2012). Correlation between PSNR and size ratio in audio steganography. Paper presented at the 11th International Conference on Telecommunications and Informatics. Proceedings of the 11th International Conference on Signal Processing, Saint Malo, Mont Saint-Michel, France.Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Abid Yahya
    • 1
  1. 1.Faculty of Engineering & TechnologyBotswana International University of Science and TechnologyPalapyeBotswana

Personalised recommendations