Steganographic Techniques Classification According to Image Format


  • Amine Khaldi Artificial Intelligence and Information Technology Laboratory (LINATI), University of Kasdi Merbah



In this work, we present a classification of steganographic methods applicable to digital images. We also propose a classification of steganographic methods according to the type of image used. We noticed there are no methods that can be applied to all image formats. Each type of image has its characteristics and each steganographic method operates on a precise colorimetric representation. This classification provides an overview of the techniques used for the steganography of digital images


Steganography, data hiding, digital image, Least Significant Bit, DCT, LUT.


Download data is not yet available.


S.Kaur, S.Bansal, R. K. Bansal, “Steganography and classification of image steganography techniques”, International Conference on Computing for Sustainable Global Development, India, 2014.

A. Abd EL-Latif, B.Abd-El-Atty, E. Venegas-Andraca, “A novel image steganography technique based on quantum substitution boxes”, Optics & Laser Technology, Volume 116, August 2019, Pages 92-102.

M.Hussain, A.Wahid Abdul Wahab, Y.Idris, S. Ho, K.Jung, “Image steganography in spatial domain: A survey”, Signal Processing: Image Communication, Volume 65, Pages 46-66, July 2018.

K.Gaurav, U.Ghanekar, “Image steganography based on Canny edge detection, dilation operator and hybrid coding”, Journal of Information Security and Applications, Volume 41, August 2018, Pages 41-51.

S.Kumar, A.Singh, M.Kumar, “Information hiding with adaptive steganography based on novel fuzzy edge identification”, Defense Technology, Volume 15, Issue 2, April 2019, Pages 162-169.

B.Feng, W.Lu, W.Sun, “Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture”, IEEE Transactions on Information Forensics and Security, Volume 10, Issue 2, April 2015, Pages 243 - 255.

S.Dagar, “Highly randomized image steganography using secret keys”, International Conference on Recent Advances and Innovations in Engineering, India, 2014.

Z.Li, Y.He, “Steganography with pixel-value differencing and modulus function based on PSO”, Journal of Information Security and Applications, Volume 43, December 2018, Pages 47-52.

A. El_Rahman, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information”, Computers & Electrical Engineering, Volume 70, August 2018, Pages 380-399.

A.Shaik, V. Thanikaiselvan R.Amitharajan, “Data Security Through Data Hiding in Images: A Review”, Journal of Artificial Intelligence, Volume 10, 2017, Pages 1-21.

M.Nutzinger, C.Fabian, M.Marschalek, “Secure Hybrid Spread Spectrum System for Steganography in Auditive Media", International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Germany, 2010.

S.Bhattacharyya, A.Khan, A.Nandi, A.Dasmalakar, S.Roy, G.Sanyal, “Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography”, World Congress on Information and Communication Technologies, India, 2011.

K.B. Raja, C.R. Chowdary, K.R. Venugopal, L.M. Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, Third International Conference on Intelligent Sensing and Information Processing, India, 2005.

G.Swain, “Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function”, Optik, Volume 180, February 2019, Pages 807-823.






Short Review

How to Cite

A. Khaldi, “Steganographic Techniques Classification According to Image Format”, Int. Ann. Sci., vol. 8, no. 1, pp. 143–149, Nov. 2019.