Analysis of Image Steganography Techniques: A Survey

نویسندگان

  • Pooja Rai
  • Sandeep Gurung
  • M. K. Ghose
  • Neil F. Johnson
  • Stefan C. Katzenbeisser
  • Fabien A. P. Petitcolas
  • Chi-Kwong Chan
  • L. M. Cheng
  • R. Chandramouli
  • Nasir Memon
  • Jessica Fridrich
  • Miroslav Goljan
  • Dorin Hogea
  • Mehdi Kharrazi
  • Husrev T. Sencar
  • Hung-Ju Lin
چکیده

Steganography is the technique of hiding data in an appropriate multimedia carrier, e. g. , image, audio, and video files known as Cover. Images are mostly used as the cover medium due to their pervasiveness in different applications and representation with high redundancy. This paper provides a review and analysis of many existing methods for digital image steganography in the spatial as well as transform domain. The performance evaluation of the algorithms with respect to the proposed analysis parameters are summarized along with their limitations inorder to throw some light on the utility of the algorithm as per the requirement of application.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

Survey and Analysis of Various Steganographic Techniques

Steganography is a method of secret communication that hides the existence of hidden message. The hidden message can be text, image, audio, video, etc. The innocent files can be a cover image after inserting the message into the cover image using stego-key, it is reffered to as stego-image. Steganography becomes more important due to the exponential growth and secret communication of potential ...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

A Survey on Image Steganography With its Related Techniques and its Types

Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The hidden message may be text, image, audio, video, etc. The files can be a cover image after inserting the message into the cover image using a ste...

متن کامل

Various JPEG Image Steganography Techniques: A Review

Image Steganography is a technique of providing some hidden data into the cover or host image so that it can be transmitted in a secure manner. There are various Image Steganography techniques implemented with some advantages and limitations. Here in this paper a complete survey of all the Image Steganography technique their advantages and issues are discussed and analyzed, hence on the basis o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015