Steganographic Techniques of Data Hiding using Digital Images

被引:22
|
作者
Saha, Babloo [1 ]
Sharma, Shuchi [2 ]
机构
[1] Inst Syst Studies & Anal, Delhi 110054, India
[2] Jaipur Inst Engn & Technol, Jaipur 303101, Rajasthan, India
关键词
Digital image steganography; data hiding; cover-image; stego-image; redundant bits; least significant bit; most significant bit; reversible data hiding; VQ INDEX TABLE;
D O I
10.14429/dsj.62.1436
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography's goal is to hide the very existence of embedded data so as not to arouse an eavesdropper's suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance, applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography.
引用
收藏
页码:11 / 18
页数:8
相关论文
共 50 条
  • [41] Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme
    Gayathri, R.
    Nagarajan, V.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 118 - 123
  • [42] Data hiding in SIM/USIM cards: A steganographic approach
    Savoldi, Antonio
    Gubian, Paolo
    SADFE 2007: SECOND INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2007, : 86 - 97
  • [43] Analysis of Different Steganographic Algorithms for Secured Data Hiding
    Umamaheswari, M.
    Sivasubramanian, S.
    Pandiarajan, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 154 - 160
  • [44] QIM DATA HIDING FOR TAMPER DETECTION AND CORRECTION IN DIGITAL IMAGES USING WAVELET TRANSFORM
    Phadikar, Amit
    Maity, Santi P.
    Mandal, Mrinal
    2010 23RD CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2010,
  • [45] AUDIO HIDING IN AN IMAGE USING STEGANOGRAPHIC METHODS
    Soundarya, J.
    Chander, Sharath P.
    Priyadharsini, R.
    Mirunalini, P.
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 82 - 87
  • [46] Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding
    Jansirani, Arockia
    Rajesh, Rengansivagurunathan
    Balasubramanian, Ramasamy
    Eswaran, Perumal
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2011, 8 (02) : 117 - 123
  • [47] Data hiding using pseudo magic squares for embedding high payload in digital images
    Ranjani, J. Jennifer
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) : 3715 - 3729
  • [48] Data hiding using pseudo magic squares for embedding high payload in digital images
    J. Jennifer Ranjani
    Multimedia Tools and Applications, 2017, 76 : 3715 - 3729
  • [49] Steganalysis System for Colour Steganographic Images using Three Different Techniques
    Aljarf, Ahd
    Amin, Saad
    Al-Jarrah, Mudhafar M.
    2018 11TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2018), 2018, : 346 - 353
  • [50] Performance evaluation of a steganographic method for digital images using side match
    Li, Suk-Ling
    Leung, Kai-Chi
    Cheng, L. M.
    Chan, Chi-Kwong
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 54 - +