A Review on Steganography Techniques

Authors

  • Wafaa Mustafa Abduallah Department of Computer Science, Nawroz University, Duhok, Iraq
  • Abdul Monem S. Rahma Department of Computer Science, University of Technology, Baghdad, Iraq

Keywords:

steganography, DCT, DWT, SVD.

Abstract

Steganography is the science of hiding a secret message in cover media, without any perceptual distortion of the cover media. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. Therefore, this paper presents most of the recent works that have been conducted on image steganography field and analyzes them to clarify the strength and weakness points in each work separately in order to be taken in consideration for future works in such field.     

References

[1] E.-S. M. El-Alfy and A. A. Al-Sadi. “High-capacity image steganography based on overlapped pixel differences and modulus function”. in Proc. of International Conference on Networked Digital Technologies, Springer Berlin Heidelberg, vol. 294, 2012, pp. 243-252.
[2] M. Conway. “Code wars: steganography, signals intelligence, and terrorism”, Technology & Policy, Springer Netherlands, vol. 16 (2), pp. 45-62, 2003.
[3] N. F. Johnson and S. Jajodia. “Exploring steganography: Seeing the unseen”. Computer, IEEE, vol. 31(2), pp. 26-34, 1998.
[4] J. Mielikainen. “LSB matching revisited”. IEEE signal processing letters, vol. 31(5), pp. 285-287, 2006.
[5] J. Sun, Y. Li, X. Zhong, and J. Li. “A Scheme of LSB Steganography Based on Concept of Finding Optimization Pixels Selection”. In Software Engineering and Knowledge Engineering: Theory and Practice, 1st ed., vol. 115, Y. Wu, Springer Berlin Heidelberg, 2012, pp. 155-160.
[6] H. T. Wu, J. L. Dugelay, Y. M. Cheung. “A data mapping method for steganography and its application to images”. In Information Hiding, 1st ed., K. Solanki, K. Sullivan and U. Madhow, Springer Berlin Heidelberg, 2008, pp. 236-250.
[7] T. Sharp “An implementation of key-based digital signal steganography”, in Information Hiding Workshop, vol. 2137, 2001, pp. 13-26.
[8] V. Sabeti, S. Samavi, and S. Shirani. “An adaptive LSB matching steganography based on octonary complexity measure”. Multimedia tools and applications, Springer, vol. 64(3), pp. 777-793, 2013.
[9] M. Goljan, J. Fridrich, and T. Holotyak .” New blind steganalysis and its implications”. In proc. Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 607201-607201.
[10] T. Pevny, P. Bas, and J. Fridrich. “Steganalysis by subtractive pixel adjacency matrix”. Information Forensics and Security, IEEE Transactions, vol.5(2), pp. 215-224, 2010.
[11] C.-C. Wu, S.-J. Kao, and M.-S. Hwang. “A high quality image sharing with steganography and adaptive authentication scheme”. Journal of Systems and Software, vol. 84(12), pp. 2196-2207, 2011.
[12] N. Pandian, and R. Thangavel.”A hybrid embedded steganography technique: optimum pixel method and matrix embedding”, in proc. of the International Conference on Advances in Computing, Communications and Informatics, ACM., 2012, pp. 1123-1130.
[13] D.-C. Wu, and W.-H. Tsai. “A steganographic method for images by pixel-value differencing”. Pattern Recognition Letters, vol. 24(9), pp. 1613-1626. 2003.
[14] C.-M. Wang, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang. “A high quality steganographic method with pixel-value differencing and modulus function”. Journal of Systems and Software, vol. 81(1), pp. 150-158, 2008.
[15] W., Luo, F. Huang, and J. Huang. “A more secure steganography based on adaptive pixel-value differencing scheme”. Multimedia tools and applications, vol. 52(2-3), pp. 407-430, 2011.
[16] Y.-H. Yu, C.-C. Chang, and I.-C. Lin, (2007). “A new steganographic method for color and grayscale image hiding”. Computer Vision and Image Understanding, vol. 107(3), pp. 183-194, 2007.
[17] T. Pevny, T. Filler, and P. Bas. “Using high-dimensional image models to perform highly undetectable steganography”. in Information Hiding Workshop, vol.6387, 2010, (pp. 161-177).
[18] Z. Sun, and Z. Ji. “A security steganography method for lossy compression gray scale image”. In Proc. Of International Conference on Intelligent Computing, Springer, vol. 4681, 2007, pp. 636-645
[19] Q. Liu, A. H. Sung, Z. Chen, and X. Huang. “A JPEG-based statistically invisible steganography”.in Proc. of the Third International Conference on Internet Multimedia Computing and Service, ACM, 2011, pp. 78-81.
[20] V. Sachnev, and H. J. Kim. “An improved matrix encoding scheme for JPEG steganography”. In International Workshop on Digital Watermarking, Springer, vol. 7128 ,2012, pp. 3-15.
[21] Y.-K. Lin. “High capacity reversible data hiding scheme based upon discrete cosine transformation”. Journal of Systems and Software, vol. 85(10), pp. 2395-2404, 2012.
[22] K. Wang, Z.-M. Lu, and Y.-J. Hu. “A high capacity lossless data hiding scheme for JPEG images”. Journal of Systems and Software, vol. 86(7), pp. 1965-1975, 2013.
[23] A. Westfeld. “F5—a steganographic algorithm”. International workshop on information hiding, Springer, vol. 2137,2001, pp. 289-302.
[24] A. S. Khashandarag, N. Ebrahimian. “a new method for color image steganography using SPIHT and DFT, sending with jpeg format”. In proc. Of International Conference on Computer Technology and Development, IEEE, 2009, pp. 582-586.
[25] A. S. Khashandarag, A. H. Navin, M. K. Mirnia, and H. H. A. Mohammadi, “An optimized color image steganography using LFSR and DFT techniques”. In Advanced Research on Computer Education, Simulation and Modeling, Springer Berlin Heidelberg, vol. 176, 2011, pp. 247-253.
[26] T. Rabie. “Digital Image Steganography: An FFT Approach”. In Networked Digital Technologies, Springer Berlin Heidelberg, vol. 294 ,2012, pp. 217-230.
[27] F. Alturki, and R. Mersereau. “Secure blind image steganographic technique using discrete fourier transformation”. In proc. of International Conference of Image Processing, IEEE, vol. 2 ,2001. pp. 542-545.
[28] R. T. McKeon. “Steganography Using the Fourier Transform and Zero-Padding Aliasing Properties”. In proc. of International Conference of Electro/information Technology, IEEE, 2006, pp. 492-497.
[29] A. Soni, J. Jain, and R. Roshan. “Image steganography using discrete fractional Fourier transform”. In proc. of International Conference of the Intelligent Systems and Signal Processing (ISSP), IEEE, 2013 pp. 97-100.
[30] S. Keshari, & S. G. Modani. ”Weighted Fractional Fourier Transform based Image Steganography”. In proc. of International Conference of the Recent Trends in Information Systems (ReTIS), IEEE, 2011, pp. 214-217.
[31] A. A. Shejul, & U. L. Kulkarni. “A DWT based approach for steganography using biometrics”. In proc. of International Conference of the Data Storage and Data Engineering (DSDE), IEEE, 2010, pp. 39-43.
[32] A. H. Yajurvedi, & S. Kulkarni. “An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform”. In Proc. of the Fourth International Conference on Signal and Image Processing (ICSIP 2012), Springer India, vol. 221, 2013, pp. 203-212.
[33] E. Ghasemi, J. Shanbehzadeh, and N. Fassihi. “High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform”. In Proc. of the International Conference in Intelligent Control and Innovative Computing, Springer US, vol.110, 2012, pp. 395-404.
[34] S. Hemalatha, U. D. Acharya, A. Renuka, and P. R. Kamath. “A Secure Image Steganography Technique to Hide Multiple Secret Images”. In Proc. of the International Conference in Computer Networks & Communications (NetCom), Springer New York, vol.131, 2013, pp. 613-620.
[35] N. Raftari, & A. M. E. Moghadam. “Digital Image Steganography Based on Integer Wavelet Transform and Assignment Algorithm”. In Proc. of the International Conference of the Modelling Symposium (AMS), IEEE,2012, pp. 87-92.
[36] V. Thanikaiselvan, & P. Arulmozhivarman. “High security image steganography using IWT and graph theory”. In Proc. of the International Conference of the Signal and Image Processing Applications (ICSIPA), IEEE, 2013, pp. 337-342.
[37] G. Prabakaran, R. Bhavani, and K. Kanimozhi. “Dual transform based steganography using wavelet families and statistical methods”. In Proc. of the International Conference of the Pattern Recognition, Informatics and Mobile Engineering (PRIME), IEEE, 2013, pp. 287-293.
[38] M. N. Do, & M. Vetterli. “Contourlets: a directional multiresolution image representation”. In Proc. of the International Conference of the Image Processing, IEEE, vol. 1, 2002, pp. 357-360.
[39] M. N. Do, and M. Vetterli. “The contourlet transform: an efficient directional multiresolution image representation”. IEEE Transactions on Image Processing, vol. 14(12), pp. 2091-2106, 2005.
[40] M. Mohan, & P. Anurenjan. “A new algorithm for data hiding in images using contourlet transform”. In Proc. of the International Conference of the Recent Advances in Intelligent Computational Systems (RAICS), IEEE, 2011, pp. 411-415.
[41] H. Sajedi, and M. Jamzad. “Adaptive steganography method based on contourlet transform”. In Proc. of the 9th International Conference of the Signal Processing, IEEE, 2008, pp. 745-748.
[42] H. Sajedi, & M. Jamza. “Using contourlet transform and cover selection for secure steganography”. International Journal of Information Security, Springer, vol. 9(5), pp. 337-352, 2010.
[43] M. S. Subhedar, & V. H. Mankar. “Performance Evaluation of Image Steganography based on Cover Selection and Contourlet Transform”. In Proc. of the International Conference of the Cloud & Ubiquitous Computing & Emerging Technologies (CUBE), IEEE, 2013 pp. 172-177.
[44] S. Pal, P. Saxena, & S. Muttoo. “Image steganography for wireless networks using the hadamard transform”. In Proc. of the International Conference of the Signal Processing and Communications (SPCOM'04), IEEE, 2004, pp. 131-135.
[45] S. Mutt & S. Kumar. “Secure image Steganography based on Slantlet transform”. In Proc. of the International Conference of the Methods and Models in Computer Science (ICM2CS), IEEE, 2009, pp. 1-7.
[46] A. A. Al-Ataby, & F. M. Al-Naima. “High Capacity Image Steganography Based on Curvelet Transform”. In Proc. of the International Conference of the Developments in E-systems Engineering (DeSE), IEEE, 2011, pp. 191-196.
[47] K. S. Babu, K., Raja, K. Rao, K. Rashmi, K. Venugopal, & L. Patnaik. “Robust and high capacity image steganography using SVD”. In Proc. of the International Conference of the Information and Communication Technology in Electrical Sciences (ICTES 2007), 2007, pp. 718 – 723.
[48] H. Abdallah, M. Hadhoud, & A. Shaalan. “An efficient SVD image steganographic approach”. Paper presented at the Computer Engineering & Systems (ICCES), IEEE, 2009. pp. 257-262.
[49] R. K. Lama, S.-J. Han, & G.-R. Kwon, “SVD based improved secret fragment visible mosaic image generation for information hiding”. Multimedia tools and applications, Springer, vol. 73(2), pp. 1-14, 2013.
[50] K. Raja, K. Kumar, S. Kumar, M. Lakshmi, H. Preeti, K. Venugopal, & L. M. Patnaik. “Genetic algorithm based steganography using wavelets”. In Proc. of the International Conference of the Information Systems Security, Springer Berlin Heidelberg, 2007, pp. 51-63.
[51] V. Kumar, & D. Kumar. “Digital Image Steganography Based on Combination of DCT and DWT”. In Proc. of the International Conference of the Information and Communication Technologies, Springer Berlin Heidelberg, 2010, pp. 596-601.
[52] R. Smko, A. Almarimi, & K. Negrat. “Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography”. In Proc. of the International Conference of the Networked Digital Technologies, Springer Berlin Heidelberg, 2010, pp. 306-313.
[53] S. B., A. Saejung, J. Preechasuk, C. Chantrapornchai. “On the comparison of digital image steganography algorithm based on DCT and wavelet”. In Proc. of the International Conference of the Computer Science and Engineering Conference (ICSEC), IEEE, 2013, pp. 328-333.
[54] A. Mansouri, A. M. Aznaveh, & F. T. Azar. “SVD-based digital image watermarking using complex wavelet transform”. Sadhana, vol. 34(3), pp. 393-406, 2009.
[55] S. KapreBhagyashri, & M. Y. Joshi. “All frequency band DWT-SVD robust watermarking technique for color images in YUV color space”. In Proc. of the International Conference of the Computer Science and Automation Engineering (CSAE), IEEE, vol. 3, 2011, pp. 295-299.
[56] N. M. Makbol, & B. E. Khoo. “A Hybrid Robust Image Watermarking Scheme Using Integer Wavelet Transform, Singular Value Decomposition and Arnold Transform”. In Proc. of the International Conference in Advances in Visual Informatics, Springer Berlin Heidelberg, 2013, pp. 36-47.
[57] E. Yavuz, & Z. Telatar. “SVD adapted DCT domain DC subband image watermarking against watermark ambiguity”. In Proc. of the International Conference in Multimedia Content Representation, Classification and Security, Springer Berlin Heidelberg, 2006, pp. 66-73.
[58] S. Das, & M. K. Kundu. “Hybrid contourlet-DCT based robust image watermarking technique applied to medical data management”. In Proc. of the International Conference in Pattern Recognition and Machine Intelligence, Springer Berlin Heidelberg, 2011, pp. 286-292.

Downloads

Published

2016-08-27

How to Cite

Abduallah, W. M., & S. Rahma, A. M. (2016). A Review on Steganography Techniques. American Scientific Research Journal for Engineering, Technology, and Sciences, 24(1), 131–150. Retrieved from https://asrjetsjournal.org/index.php/American_Scientific_Journal/article/view/2031

Issue

Section

Articles