A Comprehensive Study of Digital Image Steganographic Techniques

被引:5
作者
Rahman, Shahid [1 ]
Uddin, Jamal [1 ]
Zakarya, Muhammad [2 ,3 ]
Hussain, Hameed [4 ]
Khan, Ayaz Ali [5 ]
Ahmed, Aftab [2 ]
Haleem, Muhammad [6 ]
机构
[1] Qurtuba Univ Sci & Informat Technol, Dept Comp Sci, Peshawar 29050, Pakistan
[2] Abdul Wali Khan Univ, Dept Comp Sci, Mardan 23200, Pakistan
[3] Sohar Univ, Fac Comp & Informat Technol, Sohar 311, Oman
[4] Univ Buner, Dept Comp Sci, Khyber Pakhtunkhwa 19280, Pakistan
[5] Univ Lakki Marwat, Dept Comp Sci, Khyber Pakhtunkhwa 28420, Pakistan
[6] Kardan Univ, Dept Comp Sci, Kabul 1003, Afghanistan
关键词
Steganography; Cryptography; Security; Media; Watermarking; Robustness; Payloads; Quality assessment; data concealing; cover objects; image quality assessment metrics; HIDING DATA; STEGANALYSIS; TRANSFORMATION; HISTOGRAM; DOMAIN; CRYPTOGRAPHY; ENCRYPTION; TRENDS;
D O I
10.1109/ACCESS.2023.3237393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography surpasses other mechanisms of securing data from potential threats. The modern digital arena calls for robust information hiding techniques and, thus, it has always been a flash point for researchers and academicians. Nowadays, transmission is susceptible to numerous hacks while sharing secret information through typical correspondence channel. Accordingly, everybody needs the classification, respectability, and realness of his or her privileged information. Particularly, different techniques are used to take on these security issues like advanced declaration, computerized mark, and cryptography. Nevertheless, these strategies alone cannot be negotiated. Steganography is a revolution where current information compression, data hypothesis, spread range, and cryptography advancements are integrated to meet the requirements for protection of data over the Internet. This study investigates and critically analyses various existing cover steganography techniques and identifies the valuable region that everyone can be benefited. Moreover, we present a comprehensive overview of the fundamental concepts with in the domain of the steganographic methods and steganalysis. These systems have been depicted in numerous areas of the steganography such as spatial space, transform domain, and adaptive space. Moreover, each space has its particular traits. A few regularly involved techniques for improving the steganographic security and upgrading steganalysis capacity are elaborated, summed up; and conceivable examination patterns are talked about. We also systematically separate different methodologies in our review and show their pros and cons, qualities, challenges and significance.
引用
收藏
页码:6770 / 6791
页数:22
相关论文
共 123 条
  • [1] Abbood EA., 2018, INT J ELECTR COMPUT, V8, P2091
  • [2] Abdali N. M., 2020, PROC 30 INT TELECOMM, P1
  • [3] Abood May H., 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), P86, DOI 10.1109/NTICT.2017.7976154
  • [4] Almohammad A., 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), P215, DOI 10.1109/IPTA.2010.5586786
  • [5] A comprehensive survey of detecting tampered images and localization of the tampered region
    Anbu, T.
    Joe, M. Milton
    Murugeswari, G.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 2713 - 2751
  • [6] On the limits of steganography
    Anderson, RJ
    Petitcolas, FAP
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 474 - 481
  • [7] [Anonymous], 2013, ISRN Signal Processing, DOI [DOI 10.1155/2013/905685, 10.1155/2013/905685]
  • [8] Ansari A. S., 2019, International Journal of Computer Network and Information Security, V11, P11, DOI 10.5815/ijcnis.2019.01.02
  • [9] Anupriya A., 2018, INT J COMPUT SCI TRE, V6, P160
  • [10] Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File
    Aos, A. Z.
    Naji, A. W.
    Hameed, Shihab A.
    Othman, Fazida
    Zaidan, B. B.
    [J]. IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, : 437 - 441