An Extensive Study of Digital Image Steganography Techniques

Authors

  •   Juhi Singh Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana
  •   Mukesh Singla Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana

DOI:

https://doi.org/10.17010/ijcs/2022/v7/i4/172378

Keywords:

Data Hiding

, Information Security, Steganography, Time Domain Techniques, Watermarking.

Manuscript Received

, July 5, 2022, Revised, July 16, Accepted, July 18, 2022. Date of Publication, August 5, 2022.

Abstract

The rise of digital technology raises the importance of data security when transmitting data across a wireless communication medium. Steganography is a method of ensuring information security on a digital media. The goal of this work is to look at information hiding techniques in images which are in the spatial domain. This paper will also distinguish between watermarking and steganography, the two most popular domains of information concealment. The paper examines the benefits and drawbacks of existing algorithms, tools, and strategies to safeguard data in the digital image steganography domain.

Downloads

Download data is not yet available.

Downloads

Published

2022-08-01

How to Cite

Singh, J., & Singla, M. (2022). An Extensive Study of Digital Image Steganography Techniques. Indian Journal of Computer Science, 7(4), 40–45. https://doi.org/10.17010/ijcs/2022/v7/i4/172378

References

J. Singh and M. Singla, “Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform,†Int. J. Electr. Electron. Res., vol. 10, no. 2, pp. 122–125. [Online]. Available: https://ijeer.forexjournal.co.in/papers-pdf/ijeer-100212.pdf

G. C. Kessler and C. Hosmer, “An overview of steganography,†Advances Comput., vol. 83, pp. 51–107, 2011, doi; 10.1016/B978-0-12-385510-7.00002-3.

A. K. Singh, J. Singh, and H. V. Singh, “Steganography in images using LSB technique,†Int. J. Latest Trends Eng. Technol., vol. 5, no. 1, pp. 426–430, 2015. https://www.ijltet.org/wp-content/uploads/2015/02/60.pdf

A. U. Rahman, K. Sultan, D. Musleh, N. Aldhafferi, A. Alqahtani, and M. Mahmud, “Robust and fragile medical image watermarking: A joint venture of coding and chaos theories,†J. Healthcare Eng., vol. 2018, 2018, Art. no. 8137436.

M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,†Signal Process.: Image Communication, vol. 65, pp. 46–66, 2018, doi: 10.1016/j.image.2018.03.012.

S. Jeevitha and N. A. Prabha, “A comprehensive review of steganographic techniques and implementation,†ARPN J.Eng. Appl. Sciences, vol. 13, no. 17, pp. 4780–4791, 2018. http://www.arpnjournals.org/jeas/research_papers/rp_2018/jeas_0918_7268.pdf

J. Nanwal and P. Nanwal, “Design and implementation of Spatial Domain Technique in Steganography using RSA Encryption with genetic algorithm,†Indian J. Comp. Sci., vol. 2, no. 5, pp.13–18, 2017.

I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, “A comprehensive survey of image steganography: Techniques, evaluations, and trends in future research,†Neurocomputing, vol. 335, pp. 299–326, 2018.

F. Y. Shih, “Digital watermarking and steganography: Fundamentals and techniques, 2017. CRC press.

H. N. Khalid and A. H. M. Aman, “Digital Image Steganography in spatial domain: A critical study,†Technol. Reports of Kansai University, vol. 62, pp. 4559–4569, 2020.

A. K. Singh, H. V. Singh, and J. Singh, “Highly Impartible Spatial Domain Steganography in Double Precision Images,†2nd Int. Conf. Inventive, 2018, pp. 768–771.

M. S. Abuali, C. B. M. Rashidi, M. H.Salih, R. A. A. Raof, and S. S. Hussein, “Digital Image Steganography in Spatial Domain a comprehensive review,†J. Theoretical Appl. Inf. Technol., vol. 97, no. 19, pp. 5081–5102, 2019. http://www.jatit.org/volumes/Vol97No19/10Vol97No19.pdf

P. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications, and attacks,†Int. J. Eng. Innovative Technol., vol. 2, no. 9, pp. 165–175, 2013. https://www.ijeit.com/vol%202/Issue%209/IJEIT1412201303_31.pdf

S. Utama, R. Din, and M. Mahmuddin, “A comparative study of Text Steganography and Linguistic Steganography,†in Proc. Conf. Eng. Technol., Vocation Educ. Social Sci., 2015, Universiti Pendidikan Sultan Idris,Tanjung Malim.

Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, “Video steganography: A review,†Neurocomputing, vol. 335, pp. 238–250, 2019, doi: 10.1016/j.neucom.2018.09.091

Z. Wang, E.P. Simoncelli, A. C. Bovik, “Multiscale structural similarity for image quality assessment,†in Conf. Record 37th Asilomar Conf. Signals, Syst. & Comput.,†vol. 2., pp. 1398–1402, 2003, doi: 10.1109/ACSSC.2003.1292216.

B. T. Ahmed, "A systematic overview of secure image steganography," Int. J. Advances Appl. Sci., vol. 10, no. 2, pp. 178–187, doi: 10.11591/ijaas.v10.i2.pp178-187.

D. M. Abdullah, S. Y. Ameen, N. Omar, A. A. Salih, D. M. Ahmed, S. F. Kak, H. M. Yasin, I. M. Ibrahim, A. M Ahmed, and Z. N. Rashid, “Secure data transfer over internet using image steganography: Review,†Asian J. Res. Comp. Sci., vol. 10, no. 3, pp. 33–52, 2021, doi: 10.9734/ajrcos/2021/v10i330243.

A. K. Singh, J. Singh, and H. V. Singh, “Steganography in images using LSB technique,†Int. J. Latest Trends Eng. Technol., vol. 5, no.1, pp. 426–430, 2015.

S.A. Kumar, S. Juhi, S. H. Vikram, “DCT- and DWT-Based Intellectual Property Right Protection in Digital Images,†In: Bapi, R., Rao, K., Prasad, M. (Eds.) First Int. Conf. Artif. Intell. Cogn. Comput. Advances Intell. Syst. Comput., vol. 815. Springer, Singapore, 2019.