Open Access Open Access  Restricted Access Subscription or Fee Access

A Review on Colour Image Steganography

Sarabjeet Kaur, Sonika Jindal

Abstract


Steganography is an art of concealing information in information. It is hiding data in data technique. The main purpose of steganography is to hide the existence of secret information. Traditionally encryption is used for communication security but it does not hide the very existence of secret data. So now day‟s steganography is more popular than cryptography. Many different mediums can be used to conceal the secret information, but the images are most popular because of redundant bits. For concealing secret data in image, there is large number of steganographic techniques and every technique has its own pros and cons. In this paper, broadly the technique can be classified under two of categories, first is spatial domain and second is Transform domain. This paper gives thorough understanding and analysis of different existing digital image steganography techniques of data hiding in spatial and transform domains. It integrates recent research work of various authors.

Keywords


Decoding, Encoding, Image, Steganography

Full Text:

PDF

References


Neil F. Johnson, Sushil Jajodia, “Explore Steganography: Seeing and Unseen”, George mason university.

Amanpreet Kaur, Renu Dhir and Geeta Sikka, “A New Image Steganography Based On First Component Alteration Technique”, International journal of computer science and information security, vol.6, no.3, 2009.

Wen jan chen, chin-chen chang, T. Hoang Ngan Le., “HIGH PAYLOAD STEGANOGRAPHY MECHANISM USING HYBRID EDGE DETECTOR”, ELSEVIER, 0957-4174$-see front matter © 2009 Elsevier ltd.

Simrat Pal Kaur, Sarbjeet Singh, “A NEW IMAGE STEGANOGRAPHY BASED ON 2K CORRECTION METHOD AND CANNY EDGE DETECTION”, International journal of computing and business research (Proceedings of „I-society 2012‟ at GKU, Talwandi sabo Bathinda (Punjab)).

J.K.Mandal and Debashis Das, “COLOUR IMAGE STEGANOGRAPHY BASED ON PIXEL VALUE DIFFERENCING IN SPATIAL DOMAIN”, International journal of information sciences and techniques vol.2, No.4, july 2012.

Rajkumar Yadav, “ANALYSIS OF VARIOUS IMAGE STEGANOGRAPHY TECHNIQUES BASED UPON PSNR METRIC”, International journal of P2P network trends and technology, vol. 1,Issue-2,2011.

Mr. Vikas Tyagi, Mr. Atul kumar, Roshan patel, Sachin Tyagi, Saurabh Singh gangwar, “IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY”, Journal of global research in computer science, vol.3, No.3, March 2012.

Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub, “RGB intensity based variable bits image steganography”, IEEE Transactions, 978-0-7695-3473-2/08 $25.00 ©2008, IEEE.

Subba Rao Y.V, Brahmananda Rao S.S, Rukma Rekha N, “SECURE IMAGE STEGANOGRAPHY BASED ON THE RANDOMIZED

SEQUENCE OF CIPHER BITS”, IEEE Transactions, 978-07695-4367-3/11 $26.00 ©2011, IEEE.

Ankita Aggarwal, “SECURITY ENHANCEMENT SCHEME FOR IMAGE STEGANOGRAPHY USING S-DES TECHNIQUE” International journal of advanced research in computer science and software engineering, vol.2, issue.4, April 2012.

Qinhua huang, Weimin Ouyang, “PROTECT FRAGILE REGIONS IN STEGANOGRAPHY LSB EMBEDDING”, IEEE Transactions, 978-1-4244-8005-0/10/$26.00 © 2010, IEEE.

Rubata Riasat, Imran Sarwar Bajwa, M. Zaman Ali, “A HASH BASED APPROACH FOR COLOUR IMAGE STEGANOGRAPHY”, IEEE Transactions, 978-1-61284-941-6/11/$26.00 © 2011, IEEE.

Ali Al Ataby and Fawzi Al Naima, “A MODIFIED HIGH CAPACITY IMAGE STEGANOGRAPHY TECHNIQUE BASED ON WAVELET TRANSFORM”, The international arab journal of informational technology, vol-7, no.4, Oct-2010.

Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi, “HIGH CAPACITY IMAGE STEGANOGRAPHY USINGWAVELET TRANSFORM AND GENETIC ALGORITHM” Proceedings of international multiconference of engineers and computer scientists, vol I, March 16-18, 2011.

Raja Chowdary, C.R. , Venugopal, K.R. , Patnaik, L.M., “A SECURE IMAGE STEGANOGRAPHY USING LSB, DCT AND COMPRESSION TECHNIQUES ON RAW IMAGES”, Proceedings of international conference of intelligent sensing and information processing, 2005.

Vijay kumar, Dinesh kumar, “DIGITAL IMAGE STEGANOGRAPHY BASED ON COMBINATION OF DCT AND DWT”,proceeding of: Information and Communication Technologies - International Conference, ICT 2010, September 7-9, 2010.

Seyed mohammad seyedzade, Reza ebrahimi atani, Sattar mirzakuchaki, “A NOVEL IMAGE ENCRYPTION ALGORITHM BASED ON HASH FUNCTION”, IEEE, 978-1-4244-9708-vol-9, 2010.

Shen chuan tai, Shih ming yang, “A FAST METHOD FOR IMAGE NOISE ESTIMATION USING LAPLACIAN OPERATOR AND ADAPTIVE EDGE DETECTION”, IEEE,978-1-4244-1688-vol-2, 2008.

Kirti upreti, Kriti verma, Anita sahoo, “VARIABLE BITS SECURE SYSTEM FOR COLOR IMAGES”, International conference on advances in computing, control and telecommunication technologies,2010.

Morkel et al., 2005, “AN OVERVIEW OF IMAGE STEGANOGRAPHY”, Information security southAfrica conference (ISSA) research group, vol .1, no .1.

Pan, Feng, “IMAGE STEGANOGRAPHY METHOD BASED ON PVD AND MODULUS FUNCTION”, IEEE Transactions, International conference on electronics, communications and control, 2011.

Weiqi LuoFangjun Huang and Jiwu Huang, “EDGE ADAPTIVE IMAGE STEGANOGRAPHY BASED ON LSB MATCHING REVISITED”, IEEE Ttransactions on information forensics and security, vol. 5, no. 2, june 2010.

Usha, S. Kumar, G. A Sathish, Boopathybagan, “A SECURE TRIPLE LEVEL ENCRYPTION METHOD USING CRYPTOGRAPHY AND STEGANOGRAPHY”, IEEE Transactions, International conference of computer science and network technology, 2011.

Seyedi, Seyed Hamed, Aghaeinia, Hassan, Sayadian, Abolghasem, “A NEW ROBUST IMAGE ADAPTIVE STEGANOGRAPHY METHOD IN WAVELET DOMAIN”, IEEE Transactions, Iranian conference of electrical engineering, 2011.

Sukhpreet kaur, Sumeet kaur, “A NOVEL APPROACH FOR HIDING TEXT USING IMAGE STEAGNOGRAPHY”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 7, October 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.