Skip to main content

Steganography Techniques

  • Chapter
  • First Online:
Steganography Techniques for Digital Images

Abstract

This chapter reviews the main steganographic methods for both lossy and lossless image formats, such as JPEG and BMP. The values are presented in terms of a taxonomy that focuses on three principal steganographic techniques for hiding information in image files. Those practices comprise of those modifying the image in the spatial domain, in the transform domain, and those modifying the image file formatting. Each of these systems tries to satisfy the three most important aspects of steganographic design (imperceptibility or undetectability, capacity, and robustness). It is possible to defeat the transform domain methods by employing some efforts. With most of the steganography applications, the JPEG file format can be used, particularly with images that have to be communicated over an open system environment, like that of the Internet. Thus, for an agent to send secret information using steganographic methods, s/he must select an appropriate steganographic algorithm and cover-image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abdelwahab, A. A., & Hassaan, L. A. (2008, 18–20 March 2008). A discrete wavelet transform based technique for image data hiding. Paper presented at the radio science conference, 2008. NRSC 2008. National.

    Google Scholar 

  • Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.

    Article  Google Scholar 

  • Afrakhteh, M., & Ibrahim, S. (2010, 25–27 June 2010). Adaptive steganography scheme using more surrounding pixels. Paper presented at the Internatioal Conference on Computer Design and Applications (ICCDA), 2010.

    Google Scholar 

  • Alturki, F., & Mersereau, R. (2001, 7–10 Oct 2001). Secure blind image steganographic technique using discrete Fourier transformation. Paper presented at the International Conference on Image Processing, 2001. Proceedings.

    Google Scholar 

  • Amirtharajan, R., & Rayappan, J. B. B. (2012). Inverted pattern in inverted time domain for icon steganography. Information Technology Journal, 11(5), 587–595.

    Article  Google Scholar 

  • Anand, D., & Niranjan, U. C. (1998, 29 Oct–1 Nov 1998). Watermarking medical images with patient information. Paper presented at the Engineering in Medicine and Biology Society, 1998. Proceedings of the 20th Annual International Conference of the IEEE.

    Google Scholar 

  • Anderson, R. J., & Petitcolas, F. A. P. (2006). On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4), 474–481.

    Article  Google Scholar 

  • Areepongsa, S., Kaewkamnerd, N., Syed, Y. F., & Rao, K. R. (2000). Exploring steganography for low bit rate wavelet based coder in image retrieval system. Paper presented at the TENCON 2000. Proceedings.

    Google Scholar 

  • Areepongsa, S., Syed, Y. F., Kaewkamnerd, N., & Rao, K. R. (2000). Steganography for a low bit-rate wavelet based image coder. Paper presented at the International Conference on Image Processing, 2000. Proceedings.

    Google Scholar 

  • Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.

    Article  Google Scholar 

  • Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F. J., & Pogreb, S. (2000). Applications for data hiding. IBM Systems Journal, 39(3–4), 547–568.

    Article  Google Scholar 

  • Böhme, R., & Westfeld, A. (2004). Breaking Cauchy model-based JPEG steganography with first order statistics. In P. Samarati, P. Ryan, D. Gollmann, & R. Molva (Eds.), Computer security – ESORICS 2004 (Vol. 3193, pp. 125–140). Berlin/Heidelberg: Springer.

    Chapter  Google Scholar 

  • Böhme, R., & Westfeld, A. (2005). Exploiting preserved statistics for steganalysis Springer Science & Business Media. ISBN 364214313X, 9783642143137.

    Google Scholar 

  • Chandramouli, R., Kharrazi, M., & Memon, N. (2004). Image steganography and steganalysis: Concepts and practice Lecture notes in computer science (Vol. 2939). Berlin, Heidelberg: Springer.

    Google Scholar 

  • Chang, C.-C., & Tseng, H.-W. (2004). A steganographic method for digital images using side match. Pattern Recognition Letters, 25(12), 1431–1437.

    Article  Google Scholar 

  • Chang, C.-C., Tsai, P., & Lin, M.-H. (2004). An adaptive steganography for index-based images using codeword grouping. Paper presented at the Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing – Volume Part III, Tokyo, Japan.

    Google Scholar 

  • Cheddad, A. (2009). Steganoflage: A new image steganography algorithm. Doctor of Philosophy Thesis, University of Ulster, Northern Ireland, UK.

    Google Scholar 

  • Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2008a, March 31–April 4). Biometric Inspired Digital Image Steganography. Paper presented at 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), 2008.

    Google Scholar 

  • Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2008b, 28–30 May). Enhancing Steganography in Digital Images. Paper presented at the Canadian Conference on Computer and Robot Vision, 2008. CRV '08.

    Google Scholar 

  • Cheddad, A., Condell, J., Curran, K., & McKevitt, P. M. (2009a). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89(12), 2324–2332.

    Article  Google Scholar 

  • Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2009b). A skin tone detection algorithm for an adaptive approach to steganography. Signal Processing, 89(12), 2465–2478.

    Article  Google Scholar 

  • Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.

    Article  Google Scholar 

  • Chen, M.-C. (2010). Image security and recognition system. Ph.D. dissertation, the University of Texas at San Antonio, Texas, United States.

    Google Scholar 

  • Chen, W.-Y. (2007). Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Applied Mathematics and Computation, 185(1), 432–448.

    Article  MathSciNet  Google Scholar 

  • Chih-Hsuan, T., Zhi-Fang, Y., & Wen-Hsiang, T. (2004). Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Transactions on Communications, 52(5), 791–800.

    Article  Google Scholar 

  • Drew, M. S., & Bergner, S. (2008). Spatio-chromatic decorrelation for color image compression. Image Communication, 23(8), 599–609.

    Google Scholar 

  • EC Council. (2010). Attack phases. EC Council Press. Clifton Park, NY: Course Technology/Cengage Learning.

    Google Scholar 

  • El-Emam, N. N. (2007). Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science, 3(4), 223–232.

    Article  Google Scholar 

  • England, N. (1997). New image generation techniques. Computer Graphics and Applications, IEEE, 17(1), 39–39.

    Article  Google Scholar 

  • Farid, H. (2009). Image forgery detection. Signal Processing Magazine IEEE, 26(2), 16–25.

    Article  Google Scholar 

  • Fridrich, J. (1999). Applications of data hiding in digital images. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999, ISSPA ‘99. Australia.

    Google Scholar 

  • Fridrich, J., & Goljan, M. (2002). Practical steganalysis of digital images - state of the art. Electronic Imaging, 19–25 January 2002, San Jose, California, United States.

    Google Scholar 

  • Fridrich, J., Goljan, M., & Hogea, D. (2003). Steganalysis of JPEG images: Breaking the F5 algorithm lecture notes in computer science (Vol. 2578). Berlin, Heidelberg: Springer.

    MATH  Google Scholar 

  • Fridrich, J., Goljan, M., & Rui, D. (2001). Detecting LSB steganography in color, and gray-scale images. MultiMedia, IEEE, 8(4), 22–28.

    Article  Google Scholar 

  • Geetha, S., Kabilan, V., Chockalingam, S. P., & Kamaraj, N. (2011). Varying radix numeral system based adaptive image steganography. Information Processing Letters, 111(16), 792–797.

    Article  MathSciNet  Google Scholar 

  • Gkizeli, M., Pados, D. A., & Medley, M. J. (2007). Optimal signature design for spread-spectrum steganography. IEEE Transactions on Image Processing, 16(2), 391–405.

    Article  MathSciNet  Google Scholar 

  • Hamid, N., Yahya, A., & Ahmad, R. B. (2011a). Performance analysis of image steganography techniques. Paper presented at AKEPT’s 1st annual young researchers conference (AYRC X32011), Kuala Lumpur, Malaysia.

    Google Scholar 

  • Hamid, N., Yahya, A., & Ahmad, R. B. (2011b, 22–23 October). An overview of image steganography techniques. Paper presented at the International Postgraduate Conference on Engineering (IPCE2011), Perlis, Malaysia.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a, 10–12 April). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st IEEE International Conference on Future Communication Network (ICFCN’12). Iraq, Baghdad.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b). Secured and Robust Information Hiding Scheme. Paper presented at the Malaysian Technical Universities Conference on Engineering and Technology (MUCET2012), Kangar, Perlis, Malaysia.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012c, 18–20 June). Blind image steganography scheme using speeded-up robust features technique. Paper presented at the 2nd International Malaysia-Ireland joint symposium on engineering, science and business (IMiEJS2012), Kuala Lumpur, Malaysia.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012d). An improved robust and secured image Steganographic scheme. International Journal of Electronics and Communication Engineering & Technology (IJECET), 3(2), 484–496.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012e). A comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues (IJCSI), 9(3), 110–116.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012f). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences., 7(1), 35–55.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.

    Google Scholar 

  • Hashad, A. I., Madani, A. S., & Wahdan, A. E. M. A. (2005, 5–6 Dec 2005). A robust steganography technique using discrete cosine transform insertion. Paper presented at the ITI 3rd International Conference on Information and Communications Technology, 2005. Enabling technologies for the new knowledge society.

    Google Scholar 

  • Hernandez-Castro, J. C., Blasco-Lopez, I., Estevez-Tapiador, J. M., & Ribagorda-Garnacho, A. (2006). Steganography in games: A general methodology and its application to the game of Go. Computers and Security, 25(1), 64–71.

    Article  Google Scholar 

  • Information Hiding. In J. Fridrich (Ed.), (Vol. 3200, pp. 359–379). Berlin/Heidelberg: Springer.

    Google Scholar 

  • Jamil, T. (1999). Steganography: The art of hiding information in plain sight. Potentials IEEE, 18(1), 10–12.

    Article  Google Scholar 

  • Johnson, N. F. (1995). Steganography. Technical report. Retrieved August 24, 2012.

    Google Scholar 

  • Johnson, N. F. (2009, 2011). Steganography software. Retrieved August 26, 2012.

    Google Scholar 

  • Johnson, N. F., & Katzenbeisser, S. (2000). A survey of steganographic techniques. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 43–78). London: Artech House.

    Google Scholar 

  • Johnson, N., & Jajodia, S. (1998). Steganalysis of images created using current steganography software

    Chapter  Google Scholar 

  • Judge, J. C. (2001). Steganography: Past, present, future. Retrieved August 24, 2012

    Google Scholar 

  • Jun, K., Hongru, J., Xiaolu, L., & Zhi, Q. (2009, 22–24 Jan). A novel content-based information hiding scheme. Paper presented at theInternational Conference on Computer Engineering and Technology, 2009. ICCET ’09.

    Google Scholar 

  • Juneja, M., & Sandhu, P. S. (2009, 27–28 Oct). Designing of robust image steganography technique based on LSB insertion and encryption.Paper presented at theInternational Conference on Advances in Recent Technologies in Communication and Computing, 2009. ARTCom ’09.

    Google Scholar 

  • Katzenbeisser, S. C. (2000). Principles of steganography. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 17–41). Boston/London: Artech House.

    Google Scholar 

  • Kekre, H. B., Mishra, D., Shah, S., Shah, R., & Thakkar, C. (2012). Row-wise DCT plane sectorization in CBIR. International Journal of Computer Applications, 46(4), 29–35.

    Google Scholar 

  • Kermani, Z. Z., & Jamzad, M. (2005, December 21-21). A robust steganography algorithm based on texture similarity using Gabor filter. Paper presented at the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005. Proceedings.

    Google Scholar 

  • Kharrazi, M. (2006). Image steganography and steganalysis. PhD Dissertation, Polytechnic University, (30250643).

    Google Scholar 

  • Ki-Hyun, J., Kyeoung-Ju, H., & Kee-Young, Y. (2008, August 28–30). Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods. Paper presented at theInternational Conference on Convergence and Hybrid Information Technology, 2008. ICHIT ’08.

    Google Scholar 

  • Kruus, P., Scace, C., Heyman, M., & Mundy, M. (2003). A survey of steganographic techniques for image files. Advanced Security Research Journal, V(I), 41–52.

    Google Scholar 

  • Li, X., & Wang, J. (2007). A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Science., 177(15), 3099–3109.

    Article  Google Scholar 

  • Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142–172.

    Google Scholar 

  • Liao, X., Wen, Q.-y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1–8.

    Article  Google Scholar 

  • Lin, C.-C., & Shiu, P.-F. (2010). High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing, 1(3), 220–240.

    Google Scholar 

  • Lin, Y.-K. (2012). High capacity reversible data hiding scheme based upon discrete cosine transformation. Journal of Systems and Software, 85(10), 2395–2404. https://doi.org/10.1016/j.jss.2012.05.032

    Article  Google Scholar 

  • Low, S. H., Maxemchuk, N. F., Brassil, J. T., & O’Gorman, L. (1995, 2–6 Apr 1995). Document marking and identification using both line and word shifting. Paper presented at the INFOCOM ‘95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Boston, Massachusetts.

    Google Scholar 

  • Low, S. H., & Maxemchuk, N. F. (1998). Performance comparison of two text marking methods. IEEE Journal on Selected Areas in Communications, 16(4), 561–572.

    Article  Google Scholar 

  • Low, S. H., Maxemchuk, N. F., & Lapone, A. M. (1998). Document identification for copyright protection using centroid detection. IEEE Transactions on Communications, 46(3), 372–383.

    Article  Google Scholar 

  • Lu, C.-S. (2005). Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Hershey, Pennsylvania: Idea Group Publishing.

    Book  Google Scholar 

  • Marvel, L. M., Boncelet Jr., C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075–1083.

    Article  Google Scholar 

  • Marvel, L. M., Retter, C. T., & Boncelet, C. G., Jr. (1998a, 4–7 Oct). Hiding information in images. Paper presented at the International Conference on Image Processing, 1998. ICIP 98. Proceedings.

    Google Scholar 

  • Marvel, L. M., Retter, C. T., & Boncelet, C. G., Jr. (1998b, 18–21 Oct). A methodology for data hiding using images. Paper presented at the Military Communications Conference, 1998. MILCOM98. Proceedings., IEEE.

    Google Scholar 

  • Morkel, T., Eloff, J. H. P., & Olivier, M. S. (2005). An overview of image steganography.Paper presented at the Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa.

    Google Scholar 

  • Noda, H., Niimi, M., & Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters, 27(5), 455–461.

    Article  Google Scholar 

  • Park, Y.-R., Kang, H.-H., Shin, S.-U., & Kwon, K.-R. (2005). A steganographic scheme in digital images using information of neighboring pixels. Advances in natural computation. ICNC 2005. Lecture notes in computer science (Vol. 3612). Berlin, Heidelberg: Springer.

    Google Scholar 

  • Paulson, L. D. (2006). News briefs. Computer, 39(8), 25–27.

    Article  Google Scholar 

  • Petitcolas, F. A. P. (2000). Introduction to information hiding. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 1–12). Boston/London: Artech House.

    Google Scholar 

  • Pickholtz, R., Schilling, D., & Milstein, L. (1982). Theory of spread-spectrum communications—atutorial. IEEE Transactions on Communications, 30(5), 855–884.

    Article  Google Scholar 

  • Pitas, I. (1996, 16–19 Sep). A method for signature casting on digital images. Paper presented at the International Conference on Image Processing, 1996. Proceedings.

    Google Scholar 

  • Potdar, V. M., Han, S., & Chang, E. (2005, 10–12 Aug). A survey of digital image watermarking techniques. Paper presented at the 3rd IEEE International Conference on Industrial Informatics, 2005. INDIN ’05.

    Google Scholar 

  • Prasad, M. S., Janeyulu, S. N., Krishna, C. G., & Nagaraju, C. (2009). A novel information hiding technique for security by using image steganography. Journal of Theoretical and Applied Information Technology, 8(1), 35–39.

    Google Scholar 

  • Provos, N. (2001). Defending against statistical steganalysis. Paper presented at the Proceedings of the 10th conference on USENIX Security Symposium – Volume 10, Washington, D.C.

    Google Scholar 

  • Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32–44.

    Article  Google Scholar 

  • Radhakrishnan, R., Shanmugasundaram, K., & Memon, N. (2002, 9–11 Dec). Data masking: a secure-covert channel paradigm. Paper presented at the IEEE Workshop on Multimedia Signal Processing, 2002.

    Google Scholar 

  • Reddy, H. S. M., & Raja, K. B. (2009). High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security (IJCSS), 3(6), 462–472.

    Google Scholar 

  • Rodriguez, B. M., II. (2008). Multi-class classification for identifying JPEG steganography embedding methods. Ph.D. dissertation, Air Force Institute of Technology, Ohio, United States.

    Google Scholar 

  • Sallee, P. (2004). Model-Based Steganography Digital Watermarking. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg.

    Chapter  Google Scholar 

  • Samaratunge, S. G. K. D. N. (2007). New steganography technique for palette based images International Conference on Industrial and Information Systems, 2007. ICIIS 2007, Sri Lanka

    Google Scholar 

  • Sandford Ii, M. T., Bradley, J. N., & Handel, T. G. (1996). Data embedding method. 226–259.

    Google Scholar 

  • Shaou-Gang, M., Chin-Ming, H., Yuh-Show, T., & Hui-Mei, C. (2000). A secure data hiding technique with heterogeneous data-combining capability for electronic patient records. Paper presented at the Engineering in Medicine and Biology Society, 2000. Proceedings of the 22nd Annual International Conference of the IEEE.

    Google Scholar 

  • Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16–22.

    Article  Google Scholar 

  • Shen, C., Zhang, H., Feng, D., Cao, Z., & Huang, J. (2007). Survey of information security. Science in China Series F: Information Sciences, 50(3), 273–298.

    Article  Google Scholar 

  • Shih, F. Y. (2007). Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, FL: Taylor & Francis.

    Google Scholar 

  • Singh, R. P., Khan, M. A. A., Khan, M., & Singh, N. (2010). Spread spectrum image steganography in multimedia messaging service of mobile phones. International Journal of Electronics Engineering, 2(2), 365–369.

    Google Scholar 

  • Smith, J. R., & Comiskey, B. O. (1996). Modulation and information hiding in images. Paper presented at the Proceedings of the First International Workshop on Information Hiding.

    Chapter  Google Scholar 

  • Solanki, K., Sarkar, A., & Manjunath, B. S. (2007). YASS: Yet another steganographic scheme that resists blind steganalysis. Paper presented at the Proceedings of the 9th international conference on Information hiding, Saint Malo, France.

    Chapter  Google Scholar 

  • Syed, Y. F. (1999). A low bit rate wavelet-based image coder for transmission over hybrid networks. The University of Texas at Arlington.

    Google Scholar 

  • Syed, Y. F., & Rao, K. R. (1999, 24–27 Oct). Scalable low bit rate coding using an HC-RIOT coder. Paper presented at the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1999. Conference Record.

    Google Scholar 

  • Tzschoppe, R., Baeuml, R., Huber, J., & Kaup, A. (2003). Steganographic system based on higher-order statistics. Paper presented at the Security and Watermarking of Multimedia Contents V, Santa Clara, California, USA.

    Google Scholar 

  • Wang, C.-M., Wu, N.-I., Tsai, C.-S., & Hwang, M.-S. (2008). A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software, 81(1), 150–158.

    Article  Google Scholar 

  • Wayner, P. (2002). Disappearing cryptography information hiding: Steganography & watermarking. San Francisco: Morgan Kaufmann Publishers Inc ©2002 ISBN:1558607692.

    Google Scholar 

  • Westfeld, A. (2001). F5—a steganographic algorithm: High capacity despite better steganalysis. Paper presented at the 4th International Workshop on Information Hiding Lecture Notes in Computer Science, Vol. 2137. Springer, Berlin, Heidelberg.

    Chapter  Google Scholar 

  • Westfeld, A., & Pfitzmann, A. (2000). Attacks on Steganographic systems. Lecture notes in computer science, Vol 1768. Berlin, Heidelber: Springer.

    Chapter  Google Scholar 

  • Widadi, K. C., Ainianta, P. H., & Chan Choong, W. (2005). Blind steganography using direct sequence/frequency hopping spread spectrum technique. Paper presented at the Fifth International Conference on Information, Communications and Signal Processing, 2005 Bangkok, Thailand.

    Google Scholar 

  • Wu, D.-C., & Tsai, W.-H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613–1626.

    Article  Google Scholar 

  • Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings - Vision, Image and Signal Processing, 152(5), 611–615.

    Article  Google Scholar 

  • Xuefeng, W., Then, Y., & Chang-Tsun, L. (2005, 11–14 Sept). A palette-based image steganographic method using colour quantisation. Paper presented at the IEEE International Conference onimage processing, 2005. ICIP 2005 Genova, Italy.

    Google Scholar 

  • Yang, C.-H., & Wang, S.-J. (2006). A steganographic method for digital images by multi-pixel differencing. Paper presented at the International Computer Symposium, Taipei, Taiwan.

    Google Scholar 

  • Yesna, Y., Karen, P., & Sos, A. (2007). New quantization matrices for JPEG steganography. Paper presented at the Mobile Multimedia/Image Processing for Military and Security Applications 2007, USA.

    Google Scholar 

  • Yi-Ta, W., & Shih, F. Y. (2006). Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 36(1), 24–31.

    Article  Google Scholar 

  • Yu, L., Zhao, Y., Ni, R., & Zhu, Z. (2008). PM1 steganography in JPEG images using genetic algorithm. Soft Computing, 13(4), 393–400.

    Article  Google Scholar 

  • Yu, Y.-H., Chang, C.-C., & Lin, I.-C. (2007). A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding, 107(3), 183–194.

    Article  Google Scholar 

  • Yue, L., Chang-Tsun, L., & Chia-Hung, W. (2007, 29–31 Aug). Protection of mammograms using blind steganography and watermarking. Paper presented at the Third international symposium on Information Assurance and Security, 2007. IAS 2007 Manchester, UK.

    Google Scholar 

  • Yu-Kuen, H., Mei-Yi, W., & Jia-Hong, L. (2002). Hierarchic texture classification using statistical steganography techniques. Paper presented at the 14th International Conference on Digital Signal Processing, 2002. DSP 2002 Santorini, Greece, Greece.

    Google Scholar 

  • Zamani, M., Manaf, A. B. A., & Abdullah, S. M. (2012). Correlation between PSNR and size ratio in audio steganography. Paper presented at the 11th International Conference on Telecommunications and Informatics. Proceedings of the 11th International Conference on Signal Processing, Saint Malo, Mont Saint-Michel, France.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yahya, A. (2019). Steganography Techniques. In: Steganography Techniques for Digital Images. Springer, Cham. https://doi.org/10.1007/978-3-319-78597-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78597-4_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78535-6

  • Online ISBN: 978-3-319-78597-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics