Steganographic Techniques of Data Hiding using Digital Images

被引:22
作者
Saha, Babloo [1 ]
Sharma, Shuchi [2 ]
机构
[1] Inst Syst Studies & Anal, Delhi 110054, India
[2] Jaipur Inst Engn & Technol, Jaipur 303101, Rajasthan, India
关键词
Digital image steganography; data hiding; cover-image; stego-image; redundant bits; least significant bit; most significant bit; reversible data hiding; VQ INDEX TABLE;
D O I
10.14429/dsj.62.1436
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography's goal is to hide the very existence of embedded data so as not to arouse an eavesdropper's suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance, applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography.
引用
收藏
页码:11 / 18
页数:8
相关论文
共 44 条
  • [11] IMAGE COMPRESSION USING BLOCK TRUNCATION CODING
    DELP, EJ
    MITCHELL, OR
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1979, 27 (09) : 1335 - 1342
  • [12] Comparison among five evolutionary-based optimization algorithms
    Elbeltagi, E
    Hegazy, T
    Grierson, D
    [J]. ADVANCED ENGINEERING INFORMATICS, 2005, 19 (01) : 43 - 53
  • [13] Fazli S., 2008, IEEE INT MULT C INMI
  • [14] Fridrich J, 1999, PICS 1999 P C IM PRO, P285
  • [15] Information hiding by coverings
    Galand, F
    Kabatiansky, G
    [J]. 2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, 2003, : 151 - 154
  • [16] Gray R. M., 1984, IEEE ASSP Magazine, V1, P4, DOI 10.1109/MASSP.1984.1162229
  • [17] Secure perceptual data hiding technique using information theory
    Hadhoud, MM
    Ismail, NA
    Shawkey, W
    Mohammed, AZ
    [J]. ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 249 - 253
  • [18] Jiafu W., 2009, 1 INT WORKSH ED TECH
  • [19] Exploring steganography: Seeing the unseen
    Johnson, NF
    Jajodia, S
    [J]. COMPUTER, 1998, 31 (02) : 26 - +
  • [20] Jung Ki-Hyun., 2009, International Journal of Signal processing, Image processing and pattern, V2, P79