Steganographic Techniques of Data Hiding using Digital Images

被引:22
作者
Saha, Babloo [1 ]
Sharma, Shuchi [2 ]
机构
[1] Inst Syst Studies & Anal, Delhi 110054, India
[2] Jaipur Inst Engn & Technol, Jaipur 303101, Rajasthan, India
关键词
Digital image steganography; data hiding; cover-image; stego-image; redundant bits; least significant bit; most significant bit; reversible data hiding; VQ INDEX TABLE;
D O I
10.14429/dsj.62.1436
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography's goal is to hide the very existence of embedded data so as not to arouse an eavesdropper's suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance, applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography.
引用
收藏
页码:11 / 18
页数:8
相关论文
共 44 条
  • [1] Anand D, 1998, P ANN INT IEEE EMBS, V20, P703, DOI 10.1109/IEMBS.1998.745518
  • [2] [Anonymous], 2001, PROC INFORM HIDING
  • [3] [Anonymous], P SPIE MULTIMEDIA SY
  • [4] Chan C-S, 2009, 3 INT C UB INF MAN C, P246
  • [5] A steganographic method based upon JPEG and quantization table modification
    Chang, CC
    Chen, TS
    Chung, LZ
    [J]. INFORMATION SCIENCES, 2002, 141 (1-2) : 123 - 138
  • [6] Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
    Chang, CC
    Hsiao, JY
    Chan, CS
    [J]. PATTERN RECOGNITION, 2003, 36 (07) : 1583 - 1595
  • [7] Lossless recovery of a VQ index table with embedded secret data
    Chang, Chin-Chen
    Wu, Wen-Chuan
    Hu, Yu-Chen
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2007, 18 (03) : 207 - 216
  • [8] Reversible steganography for VQ-compressed images using side matching and relocation
    Chang, Chin-Chen
    Lin, Chih-Yang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) : 493 - 501
  • [9] Cheng Z, 2009, 6 INT C INF TECHN NE, P376
  • [10] Daneshkhah A., 2011, Proceedings of the 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2011), P189, DOI 10.1109/ISMS.2011.39