A Comprehensive Study of Digital Image Steganographic Techniques

被引:5
作者
Rahman, Shahid [1 ]
Uddin, Jamal [1 ]
Zakarya, Muhammad [2 ,3 ]
Hussain, Hameed [4 ]
Khan, Ayaz Ali [5 ]
Ahmed, Aftab [2 ]
Haleem, Muhammad [6 ]
机构
[1] Qurtuba Univ Sci & Informat Technol, Dept Comp Sci, Peshawar 29050, Pakistan
[2] Abdul Wali Khan Univ, Dept Comp Sci, Mardan 23200, Pakistan
[3] Sohar Univ, Fac Comp & Informat Technol, Sohar 311, Oman
[4] Univ Buner, Dept Comp Sci, Khyber Pakhtunkhwa 19280, Pakistan
[5] Univ Lakki Marwat, Dept Comp Sci, Khyber Pakhtunkhwa 28420, Pakistan
[6] Kardan Univ, Dept Comp Sci, Kabul 1003, Afghanistan
关键词
Steganography; Cryptography; Security; Media; Watermarking; Robustness; Payloads; Quality assessment; data concealing; cover objects; image quality assessment metrics; HIDING DATA; STEGANALYSIS; TRANSFORMATION; HISTOGRAM; DOMAIN; CRYPTOGRAPHY; ENCRYPTION; TRENDS;
D O I
10.1109/ACCESS.2023.3237393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography surpasses other mechanisms of securing data from potential threats. The modern digital arena calls for robust information hiding techniques and, thus, it has always been a flash point for researchers and academicians. Nowadays, transmission is susceptible to numerous hacks while sharing secret information through typical correspondence channel. Accordingly, everybody needs the classification, respectability, and realness of his or her privileged information. Particularly, different techniques are used to take on these security issues like advanced declaration, computerized mark, and cryptography. Nevertheless, these strategies alone cannot be negotiated. Steganography is a revolution where current information compression, data hypothesis, spread range, and cryptography advancements are integrated to meet the requirements for protection of data over the Internet. This study investigates and critically analyses various existing cover steganography techniques and identifies the valuable region that everyone can be benefited. Moreover, we present a comprehensive overview of the fundamental concepts with in the domain of the steganographic methods and steganalysis. These systems have been depicted in numerous areas of the steganography such as spatial space, transform domain, and adaptive space. Moreover, each space has its particular traits. A few regularly involved techniques for improving the steganographic security and upgrading steganalysis capacity are elaborated, summed up; and conceivable examination patterns are talked about. We also systematically separate different methodologies in our review and show their pros and cons, qualities, challenges and significance.
引用
收藏
页码:6770 / 6791
页数:22
相关论文
共 123 条
  • [51] Steganalysis of LSB matching in grayscale images
    Ker, AD
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (06) : 441 - 444
  • [52] New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing
    Khodaei, M.
    Faez, K.
    [J]. IET IMAGE PROCESSING, 2012, 6 (06) : 677 - 686
  • [53] A new method for pdf steganography in justified texts
    Khosravi, Behrooz
    Khosravi, Behnam
    Khosravi, Bahman
    Nazarkardeh, Khashayar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 61 - 70
  • [54] Kipper G., 2003, INVESTIGATORS GUIDE
  • [55] Korzhik V, 2019, PROC CONF OPEN INNOV, P179, DOI [10.23919/FRUCT.2019.8711958, 10.23919/fruct.2019.8711958]
  • [56] Kour J., 2014, INT J EMERG RES MANA, V3, P132
  • [57] Kruus P., 2003, ADV SECUR RES J, V5, P41
  • [58] Kumar A. P., 2020, IOP C SER MAT SCI EN, V981
  • [59] 6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates
    Kumar, Dhanesh
    Joshi, Anand B.
    Singh, Sonali
    Mishra, Vishnu Narayan
    Rosales, Hamurabi Gamboa
    Zhou, Liang
    Dhaka, Arvind
    Nandal, Amita
    Malik, Hasmat
    Singh, Satyendra
    [J]. IEEE ACCESS, 2021, 9 : 103056 - 103074
  • [60] Kumar SS, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), P1104, DOI 10.1109/ICCMC.2017.8282644