Review of Comparative Evaluation: Image Steganography

Authors

  • Anjani Kumar  Cluster Innovation Centre, University of Delhi, Delhi, India

Keywords:

Steganography, LSB, DCT, Stego, JSteg, PSNR

Abstract

The main aim of this paper is to develop some algorithms for hiding the information in digital image that will not be predictable by the attacker except the recipients. Here, we have studied here two methods of spatial domain steganography and frequency domain steganography each and then hides the information to produce stego­image having property of robustness to visual and statistical attacks. Finally, comparisons are shown between the signals for the detection features.

References

  1. Judge J.C. (2001): Steganography: past, present, future. SANS Institute publication, http://www.sans.org/reading_room/whitepapers/stenganography/552.php.
  2. Cheddad Abbas, Condell Joan, Curran Kevin, and Kevitt Paul Mc (2010): Review Digital image steganography: Survey and analysis of current methods‖ in Journal Signal Processing Volume 90 Issue 3, March, Pages 727-752.
  3. Zaidan A.A., Zaidan B.B., and Jalab Hamid.A (2010): “ A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared “, International Journal of Computer Theory and Engineering (IJCTE), 2010, Vol. 2, No. 2, ISSN:1793-8201, Singapore
  4. Wallace, G. K (1991): The JPEG Still Picture Compression Standard, Communications of the ACM, Vol. 34, No. 4.
  5. Sheisi Hossein, Mesgarian  Jafar, and Rahmani Mostafa (2012): Steganography: DCT Coefficient Replacement Method and Compare With JSteg Algorithm, International Journal of Computer and Electrical Engineering, Vol. 4, No. 4
  6. Kurak, C., and McHughes J (1992):  "A Cautionary Note on Image Downgrading," in IEEE    Computer Security Applications Conference 1992, Proceedings, IEEE Press, pp.153¬159.
  7. Bender, W., Gruhl D., and Morimoto N (1996): Techniques for data hiding, IBM Systems Journal, Vol. 35, No. 3&4.
  8. Jamil, T. (1999):  Steganography: The art of hiding information is plain sight, IEEE Potentials, 18:01.
  9. El-Emam N.N (2007): Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232.
  10. Ibrahim R. and Kuan T.S (2010):  Steganography imaging system (SIS): hiding secret message inside an image, Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2010, San Francisco, USA, pp. 144-148.
  11. Provos N., Honeyman P (2003):  Hide and seek: an introduction to steganography, IEEE Security and Privacy 1 (3) 32–44.
  12. Raja K.B., Chowdary C.R., Venugopal K.R., and Patnaik L.M. (2005):  A secure image steganography using LSB, DCT and compression techniques on raw images, in: Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing, ICISIP’05, Bangalore, India, 14–17 December 2005, pp. 170–176.
  13. Johnson N.F., Katzenbeisser S.C. (2000):  A survey of steganographic techniques, in: S. Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Inc., Norwood.
  14. Elbireki, Majdi Farag Mohammed, M. F. L. Abdulah, and Ali Abdrhman M.  Ukasha. “Adopting a Robust Watermarked I’m age against Cyber Security Threats Using DCT and Ramer Method”, 2014 5th International Conference on Intelligent Systems Modelling and Simulation, 2014.
  15. Vijayakumar, P., V.  Vijayalakshmi, and G. Zayaraz.  “An Improved Level of Security for DNA Steganography Using Hyper elliptic Curve Cryptography", Wireless Personal Communications, 2016.
  16. Chin-Chen Chang, Tung- Shou Chen, Lou – Zo Chung.  “A steganographic method based upon JPEG and quantizat ion table modification", Information Sciences, 2002

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Anjani Kumar, " Review of Comparative Evaluation: Image Steganography , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.518-524, September-October-2017.