Skip to main content
Log in

A Systematic Review of Computational Image Steganography Approaches

  • Review article
  • Published:
Archives of Computational Methods in Engineering Aims and scope Submit manuscript

Abstract

With the rapid growth of multimedia technologies, many images are communicated over public channels. Therefore, significant interest has been given to providing secure transmission of images over public channels. Encryption approaches are extensively utilized to secure multimedia data. However, the encrypted images are meaningless, so attackers can easily trace that the corresponding image contains some secret information. To overcome this problem, information hiding approaches such as steganography and watermarking have been introduced. Image steganography is the process of hiding secret contents in a cover image. Thus, the secret contents are hidden in such a way that it is not perceptible to the human eyes. In image steganography, the statistical model of an image is crucial for hiding information in less detectable pixels and attaining better protection. This paper aims to present a systematic review of image steganography approaches. Articles are selected from reputable databases such as IEEE Explore, Web of Science (WOS), ACM, and Willey. We describe the approaches to image steganography in this paper, including their basic concepts, performance parameters, and types. Extensive comparisons are drawn among the existing image steganography approaches to evaluate their advantages and disadvantages over each other. Blockchain based steganography techniques are also evaluated for better stego-medium. A number of future directions are presented that can assist researchers in determining the direction of future research in image steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability

The data collected during the data collection phase are available from the corresponding authors upon request.

References

  1. Mehta DM, Bhatti DG (2019) Research review on digital image steganography which resists against compression. Springer, Singapore, pp 529–534

    Google Scholar 

  2. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32–44

    Article  Google Scholar 

  3. Hussain M et al (2018) Image steganography in spatial domain: a survey. Signal Process 65:46–66

    Google Scholar 

  4. Das S et al (2018) A framework for pixel intensity modulation based image steganography. Progress in advanced computing and intelligent engineering. Springer, Singapore, pp 3–14

    Google Scholar 

  5. Cheddad A et al (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90:727–752

    Article  MATH  Google Scholar 

  6. Bi N, Sun Q, Huang D, Yang Z, Huang J (2007) Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Trans Image Process 16(8):1956–1966

    Article  MathSciNet  Google Scholar 

  7. Li XW, Kim ST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320

    Article  Google Scholar 

  8. Forouzan BA, Mukhopadhyay D (2011) Cryptography and network security (Sie). McGraw-Hill Education, New York

    Google Scholar 

  9. Arunkumar S et al (2019) SVD-based robust image steganographic scheme using RIWT and DCT for the secure transmission of medical images. Measurement 139:426–437

    Article  Google Scholar 

  10. Uma Maheswari S, Jude HD (2017) Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76:415–436

    Article  Google Scholar 

  11. Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy-based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337

    Google Scholar 

  12. Khedmati Y, Parvaz R, Behroo Y (2020) 2D Hybrid chaos map for image security transform based on framelet and cellular automata. Inf Sci 512:855–879

    Article  MathSciNet  Google Scholar 

  13. Mahana SK, Aggarwal RK (2019) Image steganography: analysis & evaluation of secret communication. In: Proceedings of international conference on sustainable computing in science, technology and management (SUSCOM), Amity University Rajasthan, Jaipur-India

  14. Jamal SS, Farwa S, Alkhaldi AH, Aslam M et al (2019) A robust steganographic technique based on improved chaotic-range systems. Chin J Phys 61:301–309

    Article  MathSciNet  Google Scholar 

  15. Muhammad K et al (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools Appl 76(6):8597–8626

    Article  Google Scholar 

  16. Anees A, Siddiqui AM, Ahmed J, Hussain I (2014) A technique for digital steganography using chaotic maps. Nonlinear Dyn 75(4):807–816

    Article  Google Scholar 

  17. Roya R, Sarkar A, Changer S (2013) Chaos-based edge adaptive image steganography. Proc Technol 10:138–146

    Article  Google Scholar 

  18. Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39–44

    Article  Google Scholar 

  19. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on the modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151

    Google Scholar 

  20. Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using LSB technique. Int J Netw Secure 19:593–598

    Google Scholar 

  21. Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906–910

    Article  Google Scholar 

  22. Torki O, Ashouri-Talouki M, Mahdavi M (2021) Blockchain for steganography: advantages, new algorithms and open challenges. http://arxiv.org/abs/2101.03103

  23. Sutaone MS, Khandare MV (2008) Image-based steganography using LSB insertion. pp 146–151

  24. Khashandarag AS et al (2011) An optimized color image steganography using LFSR and DFT techniques. In: International conference on computer education, simulation and modeling. Springer, Berlin

  25. Savithri G, Mane S, Banu JS (2017) Parallel implementation of RSA 2D-DCT steganography and chaotic 2D-DCT steganography. In: Proceedings of international conference on computer vision and image processing. Springer, Singapore pp 593–605

  26. Yang H, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497

    Article  Google Scholar 

  27. Saidi M et al (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76:13493–13510

    Article  Google Scholar 

  28. Kuo WC, Kuo SH, Wang CC, Wuu LC (2016) High capacity data hiding scheme based on multi-bit encoding function. Optik 127(4):1762–1769

    Article  Google Scholar 

  29. Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279–13308

    Article  Google Scholar 

  30. Jain M, Lenka SK (2016) Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inf 3(1):39–51

    Article  Google Scholar 

  31. Wang J et al (2021) JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image. EURASIP J Image Video Process 2021:1–14

    Article  Google Scholar 

  32. Shafi I et al (2018) An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput 22:1555–1567

    Article  Google Scholar 

  33. Islam M, Roy A, Laskar RH (2018) Neural network-based robust image watermarking technique in LWT domain. J Intell Fuzzy Syst 34:1691–1700

    Article  Google Scholar 

  34. Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473–6493

    Article  Google Scholar 

  35. Atee HA et al (2017) Extreme learning machine based optimal embedding location finder for image steganography. PLoS ONE 12:e0170329

    Article  Google Scholar 

  36. Luo T et al (2017) Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl 77:19027–19050

    Article  Google Scholar 

  37. Kaur M, Juneja M (2017) Adaptive block-based steganographic model with dynamic block estimation with fuzzy rules. Innovations in computer science and engineering. Springer, Singapore, pp 167–176

    Google Scholar 

  38. Alam S, Ahmad T, Doja MN (2017) A novel edge based chaotic steganography method using neural network. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications. Springer, Singapore

  39. Dadgostar H, Afsari F (2016) Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J Inf Secur Appl 30:94–104

    Google Scholar 

  40. Bandyopadhyay D et al (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). In: Proceedings of the fifth international conference on innovations in bio-inspired computing and applications IBICA 2014. Springer, Cham

  41. Sarreshtedari S, Akhaee MA (2014) One−third probability embedding: a new ± 1 histogram compensating image Least Significant Bit steganography scheme. IET Image Proc 8:78–89

    Article  Google Scholar 

  42. Sharma N, Batra U (2021) An enhanced Huffman-PSO based image optimization algorithm for image steganography. Genet Program Evol Mach 22(2):189–205

    Article  Google Scholar 

  43. Abdel Raouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl 80(15):23393–23417

    Article  Google Scholar 

  44. Pustokhina IV, Pustokhin DA, Shankar K (2022) Blockchain-based secure data sharing scheme using image steganography and encryption techniques for telemedicine applications. Academic Press, Boca Raton, pp 97–108

    Google Scholar 

  45. Takaoğlu M, Özyavaş A, Ajlouni N, Alsahrani A, Alkasasbeh B (2021) A novel and robust hybrid blockchain and steganography scheme. Appl Sci 11(22):10698

    Article  Google Scholar 

  46. Horng JH, Chang CC, Li GL, Lee WK, Hwang SO (2021) Blockchain-based reversible data hiding for securing medical images. J Healthcare Eng 7:1

    Article  Google Scholar 

  47. Mohsin AH, Zaidan AA, Zaidan BB, Mohammed KI, Albahri OS, Albahri AS, Alsalem MA (2021) PSO-Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. Multimed Tools Appl 80:14137–14161

    Article  Google Scholar 

  48. Xu M, Wu H, Feng G, Zhang X, Ding F (2019) Broadcasting steganography in the blockchain. Springer, Cham

    Google Scholar 

  49. Basuki AI, Rosiyadi D (2019) Joint transaction-image steganography for high capacity covert communication. In: 2019 international conference on computer, control, informatics and its applications (IC3INA). IEEE

  50. Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst 43:1–17

    Article  Google Scholar 

  51. Singh D, Singh J, Chhabra A (2012) High availability of clouds: failover strategies for cloud computing using integrated checkpointing algorithms. In: 2012 international conference on communication systems and network technologies, pp 698–703

  52. Gupta M, Gupta KK, Shukla PK (2021) Session key based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80(7):10391–10416

    Article  Google Scholar 

  53. Zhang X, Wang G (2022) Stud pose detection based on photometric stereo and lightweight YOLOv4. J Artif Intell Technol 2(1):32–37

    Google Scholar 

  54. Aggarwal A, Sharma V, Trivedi A, Yadav M, Agrawal C, Singh D, Mishra V, Gritli H (2021) Two-way feature extraction using sequential and multimodal approach for hateful meme classification. Complexity 2021 2021:5510253. https://doi.org/10.1155/2021/5510253

    Article  Google Scholar 

  55. Singh T, Saxena N, Khurana M, Singh D, Abdalla M, Alshazly H (2021) Data clustering using moth-flame optimization algorithm. Sensors 21(12):4086

    Article  Google Scholar 

  56. Chen R, Dong Pu, Tong Y, Minghu Wu (2022) Image-denoising algorithm based on improved K-singular value decomposition and atom optimization. CAAI Trans Intell Technol 7(1):117–127

    Article  Google Scholar 

  57. Singh PK (2022) Data with non-Euclidean geometry and its characterization. J Artif Intell Technol 2(1):3–8

    Google Scholar 

  58. Yadav K, Yadav M, Saini S (2022) Stock values predictions using deep learning based hybrid models. CAAI Trans Intell Technol 7(1):107–116

    Article  MATH  Google Scholar 

  59. Khare A, Shukla PK, Rizvi MA, Stalin S (2016) An intelligent and fast chaotic encryption using digital logic circuits for ad-hoc and ubiquitous computing. Entropy 18:201

    Article  Google Scholar 

  60. Zhang J, Ye G, Tu Z, Qin Y, Qin Q, Zhang J, Liu J (2020) A spatial attentive and temporal dilated (SATD) GCN for skeleton-based action recognition. CAAI Trans Intell Technol 7:46–55. https://doi.org/10.1049/cit2.12012

    Article  Google Scholar 

  61. Bai S, Song S, Liang S, Wang J, Li Bo, Neretin E (2022) UAV maneuvering decision-making algorithm based on twin delayed deep deterministic policy gradient algorithm. J Artif Intell Technol 2(1):16–22

    Google Scholar 

  62. Bairwa AK, Joshi S, Singh D (2021) Dingo optimizer: a nature-inspired metaheuristic approach for engineering problems. Math Probl Eng 2021:2571863. https://doi.org/10.1155/2021/2571863

    Article  Google Scholar 

  63. Gupta M, Gupta KK, Khosravi MR, Shukla PK, Kautish S, Shankar A (2021) An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things. Wirel Personal Commun 121:1857–1878

    Article  Google Scholar 

  64. Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International conference on intelligent computing and applications. Springer, Singapore

  65. Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158–168

    Article  Google Scholar 

  66. Pabbi A, Malhotra R, Manikandan K (2021) Implementation of least significant bit image steganography with advanced encryption standard. In: 2021 international conference on emerging smart computing and informatics (ESCI). IEEE

  67. Xiang T, Jia Hu, Sun J (2015) Outsourcing chaotic selective image encryption to the cloud with steganography. Digit Signal Process 43:28–37

    Article  Google Scholar 

  68. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907

    Article  MATH  Google Scholar 

  69. Roy R, Sarkar A, Changder S (2013) Chaos-based edge adaptive image steganography. Procedia Technol 10(8):138–146

    Article  Google Scholar 

  70. Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302

    Article  MathSciNet  Google Scholar 

  71. Martínez-González RF (2016) A steganographic method using Bernoulli’s chaotic maps. Comput Electr Eng 54:435–449

    Article  Google Scholar 

  72. Kapadia AM, Nithyanandam P (2019) Secured reversible matrix embedding based on the dual image using integer wavelet and arnold transform. Procedia Comput Sci 165:766–773

    Article  Google Scholar 

  73. Thenmozhi S, Chandrasekaran M (2013) A novel technique for image steganography using the nonlinear chaotic map. In: 2013 7th international conference on intelligent systems and control (ISCO). IEEE

  74. Valandar MY, Ayubi P, Barani MJ (2015) High secure digital image steganography based on the 3D chaotic map. In: 2015 7th conference on information and knowledge technology (IKT). IEEE

  75. Latha R, Premkumar R, Anand S (2018) An efficient wavelet transform based steganography technique using chaotic map. In: 2018 international conference on current trends towards converging technologies (ICCTCT). IEEE

  76. Elkandoz MT, Alexan W, Hussein HH (2019) 3D image steganography using sine logistic map and 2D hyperchaotic map. In: 2019 international conference on electrical and computing technologies and applications (ICECTA). IEEE

  77. Bremnavas I, Poorna B, Kanagachidambaresan GR (2011) Medical image security using LSB and chaotic logistic map. pp 229–231

  78. Najeena KS, Imran BM (2013) An efficient steganographic technique based on chaotic maps and adaptive PPM embedding. In: 2013 international conference on signal processing, image processing & pattern recognition. IEEE

  79. Reddy VP, Fathima AA (2016) A cost-effective approach for securing medical X-ray images using Chebyshev map. In: 2016 international conference on recent trends in information technology (ICRTIT). IEEE

  80. El-Alfy ES, Al-Sadi AA (2012) Improved pixel value differencing steganography using logistic chaotic maps. In: 2012 international conference on innovations in information technology (IIT). IEEE

  81. Li X, Yang B, Cheng D, Zeng T (2009) A generalization of LSB matching. IEEE Signal Process Lett 16(2):69–72

    Article  Google Scholar 

  82. Khodaei M, Faez K (2012) New adaptive steganographic method using least significant- bit substitution and pixel-value differencing. IET Image Process 6(6):677–686

    Article  Google Scholar 

  83. Wang J, Ni J, Zhang X, Shi Y-Q (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting’. IEEE Trans Cybern 47(2):315–326

    Google Scholar 

  84. Das S, Sharma S, Bakshi S, Mukherjee I (2018) A framework for pixel intensity modulation based image steganography. Proc Adv Comput Intell Eng 563:3–14. https://doi.org/10.1007/978-981-10-6872-0_1

    Article  Google Scholar 

  85. Aziz M, Tayarani-N MH, Afsar M (2015) A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dyn 80(3):1271–1290

    Article  Google Scholar 

  86. Prasad S, Pal AK (2018) Logistic map based image steganography scheme using combined LSB and PVD for security enhancement. In: Dutta P, Mandal J, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Springer, Singapore

    Google Scholar 

  87. Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Proc Comput Sci 85(85):39–44

    Article  Google Scholar 

  88. Yang T, Wu CW, Chua LO (1997) Cryptography based on chaotic systems. IEEE Trans Circ Syst I 44(5):469–472

    Article  MATH  Google Scholar 

  89. Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45:1–14

    Article  Google Scholar 

  90. Hamza YA (2019) Highly secure image steganography approach using Arnold's Cat map and maximum image entropy. In: Proceedings of the international conference on information and communication technology

  91. Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326

    Article  Google Scholar 

  92. Walia GS, Makhija S, Singh K, Sharma K (2018) Robust stego-key directed LSB substitution scheme based upon the cuckoo search and chaotic map. Optik 170:106–124

    Article  Google Scholar 

  93. Martínez-González RF, Díaz-Méndez JA, Palacios-Luengas L, López-Hernández J, Vázquez-Medina R (2016) A steganographic method using Bernoulli’s chaotic maps. Comput Electr Eng 54:435–449

    Article  Google Scholar 

  94. Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26–34

    Article  Google Scholar 

  95. Judge JC (2001) Steganography: past, present, future. SANS white paper 30

  96. Petitcolas FAP, Katzenbeisser s, (2000) Information hiding techniques for steganography and digital watermarking (Artech House Computer Security Series). Artech House, London

    Google Scholar 

  97. Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(1999):1062–1078

    Article  Google Scholar 

  98. Du J-X et al (2006) Computer-aided plant species identification (CAPSI) based on leaf shape matching technique. Trans Inst Meas Control 28(3):275–285

    Article  Google Scholar 

  99. Zheng C-H et al (2006) Nonnegative independent component analysis based on minimizing mutual information technique. Neurocomputing 69:878–883

    Article  Google Scholar 

  100. Mishra M, Mishra P, Adhikary MC (2014) Digital image data hiding techniques: a comparative study. http://arxiv.org/abs/1408.3564

  101. Grajeda-Marín IR, Montes-Venegas HA, Marcial-Romero JR, Hernández-Servín JA, Muñoz-Jiménez V, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int J Pattern Recognit Artif Intell 32(01):1860010

    Article  Google Scholar 

  102. Divya V, Sasirekha N (2016) High capacity steganography technique based on wavelet transform. In: 2016 online international conference on green engineering and technologies (IC-GET), IEEE pp 1–5

  103. AL-Shaaby T (2017) Cryptography and steganography: new approach. Trans Netw Commun 5(6):25

    Google Scholar 

  104. Conklin WA, White G, Cothren C, Davis R, Williams D (2015) Principles of computer security. McGraw-Hill Education Group, London

    Google Scholar 

  105. Khanam MS, Verma MJA (2018) Novel and efficient video steganography approach for enhanced security

  106. Devadiga N, Kothari H, Jain H, Sankhe S (2017) E-banking security using cryptography. Steganogr Data Min Int J Comput Appl 164:9

    Google Scholar 

  107. Hashim M, Rahim M, Shafry M, Alwan AA (2018) A review and open issues of multifarious image steganography techniques in spatial domain. J Theor Appl Inf Technol 96:4

    Google Scholar 

  108. Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62

    Google Scholar 

  109. Al-Hussain A (2008) Biometric-based authentication security. In: Goel V (ed) That fingerprint sensor on your phone is not as safe as you think. New York Times, New York

    Google Scholar 

  110. Jain K, Nandakumar AK (2012) Biometric authentication: system security and user privacy. Computer 45:87–92

    Article  Google Scholar 

  111. Galbally J, Fierrez J, Alonso-Fernandez F, Martinez-Diaz M (2011) Evaluation of direct attacks to fingerprint verification systems. Telecommun Syst (Springer) 4–3(3–4):243–254

    Article  Google Scholar 

  112. Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494–1498

    Article  Google Scholar 

  113. Abd-El-Atty B, Iliyasu AM, Alaskar H, El-Latif A, Ahmed A (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11):3108

    Article  Google Scholar 

  114. Pandey HM (2020) Secure medical data transmission using a fusion of bitmask oriented genetic algorithm, encryption, and steganography. Future Gener Comput Syst 111:213–225

    Article  Google Scholar 

  115. Abikoye OC et al (2020) A safe and secured iris template using steganography and cryptography. Multimed Tools Appl 79:1–24

    Article  Google Scholar 

  116. Zainal-Abidin Z et al (2019) Development of iris template protection using LSBRN for biometrics security. IJCSNS Int J Comput Sci Netw Secur 19:7

    Google Scholar 

  117. Ghazi GH, Kaniana G (2018) An enhanced biometric information security system using orthogonal codes and LSB steganography. In: 2018 second international conference on inventive communication and computational technologies (ICICCT), IEEE

  118. Mohsin AH et al (2019) Based medical systems for patient’s authentication: towards a new verification secure framework using CIA standard. J Med Syst 43(7):192

    Article  Google Scholar 

  119. Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using LSB technique. IJ Netw Secur 19(4):593–598

    Google Scholar 

  120. Nyeem H (2017) Reversible data hiding with image bit-plane slicing. In: 2017 20th international conference of computer and information technology (ICCIT), IEEE

  121. Kalita M, Tuithung T (2016) A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution. In: 2016 international conference on systems, signals and image processing (IWSSIP), IEEE

  122. Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101

    Article  MathSciNet  Google Scholar 

  123. Yuan HD (2014) Secret sharing with multi−cover adaptive steganography. Inf Sci 254:197–212

    Article  MathSciNet  MATH  Google Scholar 

  124. Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia Tools Appl 73:2223–2245

    Article  Google Scholar 

  125. Hernández-Servin JA, Marcial-Romero JR, Jiménez VM, Montes-Venegas HA (2015) A modification of the TPVD algorithm for data embedding. Springer, New York

    Book  Google Scholar 

  126. Chen J (2014) A PVD−based data hiding method with histogram preserving using pixel pair matching. Signal Process 29:375–384

    Google Scholar 

  127. Jafar IF, Darabkh KA, Al-Zubi RT, Al Namneh RA (2016) Efficient reversible data hiding using multiple predictors. Comput J 59(3):423–438

    Article  MathSciNet  Google Scholar 

  128. Pan Z, Hu S, Ma X, Wang L (2015) Reversible data hiding based on local histogram shifting with multilayer embedding. J Vis Commun Image Represent 31:64–74

    Article  Google Scholar 

  129. Chen NK, Su CY, Shih CY, Chen YT (2016) Reversible watermarking for medical images using histogram shifting with location map reduction. In: 2016 IEEE international conference on industrial technology (ICIT). pp 792–797

  130. Tseng HW, Leng HS (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Proc 8:647–654

    Article  Google Scholar 

  131. Jung KH, Yoo KY (2014) Data hiding using edge detector for scalable images. Multimedia Tools Appl 71:1455–1468

    Article  Google Scholar 

  132. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306

    Article  Google Scholar 

  133. Sun S (2016) A novel edge-based image steganography with 2 k correction and Huffman encoding. Inf Process Lett 116:93–99

    Article  MathSciNet  MATH  Google Scholar 

  134. Roy R, Changder S (2014) Image realization steganography with LCS based mapping. In: 2014 seventh international conference on contemporary computing (IC3), IEEE, pp 218−223

  135. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping. In: International conference on research in security standardisation, Springer, pp 151−166

  136. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130

    Article  Google Scholar 

  137. El-Emam NN, Al-Diabat M (2015) A novel algorithm for color image steganography using a new intelligent technique based on three phases. Appl Soft Comput 37:830–846

    Article  Google Scholar 

  138. Doğan Ş (2016) A new data hiding method based on chaos embedded genetic algorithm for a color image. Artif Intell Rev 46:129–143

    Article  Google Scholar 

  139. Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131–141

    Article  Google Scholar 

  140. Nguyen TD, Arch-int S, Arch-int N (2016) An adaptive multi-bit-plane image steganography using block data-hiding. Multimed Tools Appl 75:8319–8345

    Article  Google Scholar 

Download references

Funding

This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2021-0-00118, Development of decentralized consensus composition technology for large-scale nodes) and This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2021-0-01835) supervised by the IITP (Institute of Information & Communications Technology Planning & Evaluation).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heung-No Lee.

Ethics declarations

Conflict of interest

The authors would like to confirm there are no conflicts of interest regarding the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, S., Singh, S., Kaur, M. et al. A Systematic Review of Computational Image Steganography Approaches. Arch Computat Methods Eng 29, 4775–4797 (2022). https://doi.org/10.1007/s11831-022-09749-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11831-022-09749-0

Navigation