Steganographic Techniques Classification According to Image Format
DOI:
https://doi.org/10.21467/ias.8.1.143-149Abstract
In this work, we present a classification of steganographic methods applicable to digital images. We also propose a classification of steganographic methods according to the type of image used. We noticed there are no methods that can be applied to all image formats. Each type of image has its characteristics and each steganographic method operates on a precise colorimetric representation. This classification provides an overview of the techniques used for the steganography of digital images
Keywords:
Steganography, data hiding, digital image, Least Significant Bit, DCT, LUT.Downloads
References
S.Kaur, S.Bansal, R. K. Bansal, “Steganography and classification of image steganography techniques”, International Conference on Computing for Sustainable Global Development, India, 2014.
A. Abd EL-Latif, B.Abd-El-Atty, E. Venegas-Andraca, “A novel image steganography technique based on quantum substitution boxes”, Optics & Laser Technology, Volume 116, August 2019, Pages 92-102.
M.Hussain, A.Wahid Abdul Wahab, Y.Idris, S. Ho, K.Jung, “Image steganography in spatial domain: A survey”, Signal Processing: Image Communication, Volume 65, Pages 46-66, July 2018.
K.Gaurav, U.Ghanekar, “Image steganography based on Canny edge detection, dilation operator and hybrid coding”, Journal of Information Security and Applications, Volume 41, August 2018, Pages 41-51.
S.Kumar, A.Singh, M.Kumar, “Information hiding with adaptive steganography based on novel fuzzy edge identification”, Defense Technology, Volume 15, Issue 2, April 2019, Pages 162-169.
B.Feng, W.Lu, W.Sun, “Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture”, IEEE Transactions on Information Forensics and Security, Volume 10, Issue 2, April 2015, Pages 243 - 255.
S.Dagar, “Highly randomized image steganography using secret keys”, International Conference on Recent Advances and Innovations in Engineering, India, 2014.
Z.Li, Y.He, “Steganography with pixel-value differencing and modulus function based on PSO”, Journal of Information Security and Applications, Volume 43, December 2018, Pages 47-52.
A. El_Rahman, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information”, Computers & Electrical Engineering, Volume 70, August 2018, Pages 380-399.
A.Shaik, V. Thanikaiselvan R.Amitharajan, “Data Security Through Data Hiding in Images: A Review”, Journal of Artificial Intelligence, Volume 10, 2017, Pages 1-21.
M.Nutzinger, C.Fabian, M.Marschalek, “Secure Hybrid Spread Spectrum System for Steganography in Auditive Media", International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Germany, 2010.
S.Bhattacharyya, A.Khan, A.Nandi, A.Dasmalakar, S.Roy, G.Sanyal, “Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography”, World Congress on Information and Communication Technologies, India, 2011.
K.B. Raja, C.R. Chowdary, K.R. Venugopal, L.M. Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, Third International Conference on Intelligent Sensing and Information Processing, India, 2005.
G.Swain, “Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function”, Optik, Volume 180, February 2019, Pages 807-823.
Downloads
Published
Issue
Section
How to Cite
License
Copyright (c) 2019 Amine Khaldi

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Author(s) retains full copyright of their article and grants non-exclusive publishing right to International Annals of Science and its publisher "AIJR (India)". Author(s) can archive pre-print, post-print, and published version/PDF to any open access, institutional repository, social media, or personal website provided that Published source must be acknowledged with citation and link to publisher version.
Click here for more information on Copyright policy
Click here for more information on Licensing policy