Abstract
This chapter reviews the main steganographic methods for both lossy and lossless image formats, such as JPEG and BMP. The values are presented in terms of a taxonomy that focuses on three principal steganographic techniques for hiding information in image files. Those practices comprise of those modifying the image in the spatial domain, in the transform domain, and those modifying the image file formatting. Each of these systems tries to satisfy the three most important aspects of steganographic design (imperceptibility or undetectability, capacity, and robustness). It is possible to defeat the transform domain methods by employing some efforts. With most of the steganography applications, the JPEG file format can be used, particularly with images that have to be communicated over an open system environment, like that of the Internet. Thus, for an agent to send secret information using steganographic methods, s/he must select an appropriate steganographic algorithm and cover-image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdelwahab, A. A., & Hassaan, L. A. (2008, 18–20 March 2008). A discrete wavelet transform based technique for image data hiding. Paper presented at the radio science conference, 2008. NRSC 2008. National.
Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.
Afrakhteh, M., & Ibrahim, S. (2010, 25–27 June 2010). Adaptive steganography scheme using more surrounding pixels. Paper presented at the Internatioal Conference on Computer Design and Applications (ICCDA), 2010.
Alturki, F., & Mersereau, R. (2001, 7–10 Oct 2001). Secure blind image steganographic technique using discrete Fourier transformation. Paper presented at the International Conference on Image Processing, 2001. Proceedings.
Amirtharajan, R., & Rayappan, J. B. B. (2012). Inverted pattern in inverted time domain for icon steganography. Information Technology Journal, 11(5), 587–595.
Anand, D., & Niranjan, U. C. (1998, 29 Oct–1 Nov 1998). Watermarking medical images with patient information. Paper presented at the Engineering in Medicine and Biology Society, 1998. Proceedings of the 20th Annual International Conference of the IEEE.
Anderson, R. J., & Petitcolas, F. A. P. (2006). On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4), 474–481.
Areepongsa, S., Kaewkamnerd, N., Syed, Y. F., & Rao, K. R. (2000). Exploring steganography for low bit rate wavelet based coder in image retrieval system. Paper presented at the TENCON 2000. Proceedings.
Areepongsa, S., Syed, Y. F., Kaewkamnerd, N., & Rao, K. R. (2000). Steganography for a low bit-rate wavelet based image coder. Paper presented at the International Conference on Image Processing, 2000. Proceedings.
Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.
Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F. J., & Pogreb, S. (2000). Applications for data hiding. IBM Systems Journal, 39(3–4), 547–568.
Böhme, R., & Westfeld, A. (2004). Breaking Cauchy model-based JPEG steganography with first order statistics. In P. Samarati, P. Ryan, D. Gollmann, & R. Molva (Eds.), Computer security – ESORICS 2004 (Vol. 3193, pp. 125–140). Berlin/Heidelberg: Springer.
Böhme, R., & Westfeld, A. (2005). Exploiting preserved statistics for steganalysis Springer Science & Business Media. ISBN 364214313X, 9783642143137.
Chandramouli, R., Kharrazi, M., & Memon, N. (2004). Image steganography and steganalysis: Concepts and practice Lecture notes in computer science (Vol. 2939). Berlin, Heidelberg: Springer.
Chang, C.-C., & Tseng, H.-W. (2004). A steganographic method for digital images using side match. Pattern Recognition Letters, 25(12), 1431–1437.
Chang, C.-C., Tsai, P., & Lin, M.-H. (2004). An adaptive steganography for index-based images using codeword grouping. Paper presented at the Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing – Volume Part III, Tokyo, Japan.
Cheddad, A. (2009). Steganoflage: A new image steganography algorithm. Doctor of Philosophy Thesis, University of Ulster, Northern Ireland, UK.
Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2008a, March 31–April 4). Biometric Inspired Digital Image Steganography. Paper presented at 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), 2008.
Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2008b, 28–30 May). Enhancing Steganography in Digital Images. Paper presented at the Canadian Conference on Computer and Robot Vision, 2008. CRV '08.
Cheddad, A., Condell, J., Curran, K., & McKevitt, P. M. (2009a). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89(12), 2324–2332.
Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2009b). A skin tone detection algorithm for an adaptive approach to steganography. Signal Processing, 89(12), 2465–2478.
Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.
Chen, M.-C. (2010). Image security and recognition system. Ph.D. dissertation, the University of Texas at San Antonio, Texas, United States.
Chen, W.-Y. (2007). Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Applied Mathematics and Computation, 185(1), 432–448.
Chih-Hsuan, T., Zhi-Fang, Y., & Wen-Hsiang, T. (2004). Adaptive data hiding in palette images by color ordering and mapping with security protection. IEEE Transactions on Communications, 52(5), 791–800.
Drew, M. S., & Bergner, S. (2008). Spatio-chromatic decorrelation for color image compression. Image Communication, 23(8), 599–609.
EC Council. (2010). Attack phases. EC Council Press. Clifton Park, NY: Course Technology/Cengage Learning.
El-Emam, N. N. (2007). Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science, 3(4), 223–232.
England, N. (1997). New image generation techniques. Computer Graphics and Applications, IEEE, 17(1), 39–39.
Farid, H. (2009). Image forgery detection. Signal Processing Magazine IEEE, 26(2), 16–25.
Fridrich, J. (1999). Applications of data hiding in digital images. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999, ISSPA ‘99. Australia.
Fridrich, J., & Goljan, M. (2002). Practical steganalysis of digital images - state of the art. Electronic Imaging, 19–25 January 2002, San Jose, California, United States.
Fridrich, J., Goljan, M., & Hogea, D. (2003). Steganalysis of JPEG images: Breaking the F5 algorithm lecture notes in computer science (Vol. 2578). Berlin, Heidelberg: Springer.
Fridrich, J., Goljan, M., & Rui, D. (2001). Detecting LSB steganography in color, and gray-scale images. MultiMedia, IEEE, 8(4), 22–28.
Geetha, S., Kabilan, V., Chockalingam, S. P., & Kamaraj, N. (2011). Varying radix numeral system based adaptive image steganography. Information Processing Letters, 111(16), 792–797.
Gkizeli, M., Pados, D. A., & Medley, M. J. (2007). Optimal signature design for spread-spectrum steganography. IEEE Transactions on Image Processing, 16(2), 391–405.
Hamid, N., Yahya, A., & Ahmad, R. B. (2011a). Performance analysis of image steganography techniques. Paper presented at AKEPT’s 1st annual young researchers conference (AYRC X32011), Kuala Lumpur, Malaysia.
Hamid, N., Yahya, A., & Ahmad, R. B. (2011b, 22–23 October). An overview of image steganography techniques. Paper presented at the International Postgraduate Conference on Engineering (IPCE2011), Perlis, Malaysia.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a, 10–12 April). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st IEEE International Conference on Future Communication Network (ICFCN’12). Iraq, Baghdad.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b). Secured and Robust Information Hiding Scheme. Paper presented at the Malaysian Technical Universities Conference on Engineering and Technology (MUCET2012), Kangar, Perlis, Malaysia.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012c, 18–20 June). Blind image steganography scheme using speeded-up robust features technique. Paper presented at the 2nd International Malaysia-Ireland joint symposium on engineering, science and business (IMiEJS2012), Kuala Lumpur, Malaysia.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012d). An improved robust and secured image Steganographic scheme. International Journal of Electronics and Communication Engineering & Technology (IJECET), 3(2), 484–496.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012e). A comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues (IJCSI), 9(3), 110–116.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012f). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.
Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences., 7(1), 35–55.
Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.
Hashad, A. I., Madani, A. S., & Wahdan, A. E. M. A. (2005, 5–6 Dec 2005). A robust steganography technique using discrete cosine transform insertion. Paper presented at the ITI 3rd International Conference on Information and Communications Technology, 2005. Enabling technologies for the new knowledge society.
Hernandez-Castro, J. C., Blasco-Lopez, I., Estevez-Tapiador, J. M., & Ribagorda-Garnacho, A. (2006). Steganography in games: A general methodology and its application to the game of Go. Computers and Security, 25(1), 64–71.
Information Hiding. In J. Fridrich (Ed.), (Vol. 3200, pp. 359–379). Berlin/Heidelberg: Springer.
Jamil, T. (1999). Steganography: The art of hiding information in plain sight. Potentials IEEE, 18(1), 10–12.
Johnson, N. F. (1995). Steganography. Technical report. Retrieved August 24, 2012.
Johnson, N. F. (2009, 2011). Steganography software. Retrieved August 26, 2012.
Johnson, N. F., & Katzenbeisser, S. (2000). A survey of steganographic techniques. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 43–78). London: Artech House.
Johnson, N., & Jajodia, S. (1998). Steganalysis of images created using current steganography software
Judge, J. C. (2001). Steganography: Past, present, future. Retrieved August 24, 2012
Jun, K., Hongru, J., Xiaolu, L., & Zhi, Q. (2009, 22–24 Jan). A novel content-based information hiding scheme. Paper presented at theInternational Conference on Computer Engineering and Technology, 2009. ICCET ’09.
Juneja, M., & Sandhu, P. S. (2009, 27–28 Oct). Designing of robust image steganography technique based on LSB insertion and encryption.Paper presented at theInternational Conference on Advances in Recent Technologies in Communication and Computing, 2009. ARTCom ’09.
Katzenbeisser, S. C. (2000). Principles of steganography. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 17–41). Boston/London: Artech House.
Kekre, H. B., Mishra, D., Shah, S., Shah, R., & Thakkar, C. (2012). Row-wise DCT plane sectorization in CBIR. International Journal of Computer Applications, 46(4), 29–35.
Kermani, Z. Z., & Jamzad, M. (2005, December 21-21). A robust steganography algorithm based on texture similarity using Gabor filter. Paper presented at the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005. Proceedings.
Kharrazi, M. (2006). Image steganography and steganalysis. PhD Dissertation, Polytechnic University, (30250643).
Ki-Hyun, J., Kyeoung-Ju, H., & Kee-Young, Y. (2008, August 28–30). Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods. Paper presented at theInternational Conference on Convergence and Hybrid Information Technology, 2008. ICHIT ’08.
Kruus, P., Scace, C., Heyman, M., & Mundy, M. (2003). A survey of steganographic techniques for image files. Advanced Security Research Journal, V(I), 41–52.
Li, X., & Wang, J. (2007). A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Science., 177(15), 3099–3109.
Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142–172.
Liao, X., Wen, Q.-y., & Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1–8.
Lin, C.-C., & Shiu, P.-F. (2010). High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing, 1(3), 220–240.
Lin, Y.-K. (2012). High capacity reversible data hiding scheme based upon discrete cosine transformation. Journal of Systems and Software, 85(10), 2395–2404. https://doi.org/10.1016/j.jss.2012.05.032
Low, S. H., Maxemchuk, N. F., Brassil, J. T., & O’Gorman, L. (1995, 2–6 Apr 1995). Document marking and identification using both line and word shifting. Paper presented at the INFOCOM ‘95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Boston, Massachusetts.
Low, S. H., & Maxemchuk, N. F. (1998). Performance comparison of two text marking methods. IEEE Journal on Selected Areas in Communications, 16(4), 561–572.
Low, S. H., Maxemchuk, N. F., & Lapone, A. M. (1998). Document identification for copyright protection using centroid detection. IEEE Transactions on Communications, 46(3), 372–383.
Lu, C.-S. (2005). Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Hershey, Pennsylvania: Idea Group Publishing.
Marvel, L. M., Boncelet Jr., C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075–1083.
Marvel, L. M., Retter, C. T., & Boncelet, C. G., Jr. (1998a, 4–7 Oct). Hiding information in images. Paper presented at the International Conference on Image Processing, 1998. ICIP 98. Proceedings.
Marvel, L. M., Retter, C. T., & Boncelet, C. G., Jr. (1998b, 18–21 Oct). A methodology for data hiding using images. Paper presented at the Military Communications Conference, 1998. MILCOM98. Proceedings., IEEE.
Morkel, T., Eloff, J. H. P., & Olivier, M. S. (2005). An overview of image steganography.Paper presented at the Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa.
Noda, H., Niimi, M., & Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters, 27(5), 455–461.
Park, Y.-R., Kang, H.-H., Shin, S.-U., & Kwon, K.-R. (2005). A steganographic scheme in digital images using information of neighboring pixels. Advances in natural computation. ICNC 2005. Lecture notes in computer science (Vol. 3612). Berlin, Heidelberg: Springer.
Paulson, L. D. (2006). News briefs. Computer, 39(8), 25–27.
Petitcolas, F. A. P. (2000). Introduction to information hiding. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 1–12). Boston/London: Artech House.
Pickholtz, R., Schilling, D., & Milstein, L. (1982). Theory of spread-spectrum communications—atutorial. IEEE Transactions on Communications, 30(5), 855–884.
Pitas, I. (1996, 16–19 Sep). A method for signature casting on digital images. Paper presented at the International Conference on Image Processing, 1996. Proceedings.
Potdar, V. M., Han, S., & Chang, E. (2005, 10–12 Aug). A survey of digital image watermarking techniques. Paper presented at the 3rd IEEE International Conference on Industrial Informatics, 2005. INDIN ’05.
Prasad, M. S., Janeyulu, S. N., Krishna, C. G., & Nagaraju, C. (2009). A novel information hiding technique for security by using image steganography. Journal of Theoretical and Applied Information Technology, 8(1), 35–39.
Provos, N. (2001). Defending against statistical steganalysis. Paper presented at the Proceedings of the 10th conference on USENIX Security Symposium – Volume 10, Washington, D.C.
Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32–44.
Radhakrishnan, R., Shanmugasundaram, K., & Memon, N. (2002, 9–11 Dec). Data masking: a secure-covert channel paradigm. Paper presented at the IEEE Workshop on Multimedia Signal Processing, 2002.
Reddy, H. S. M., & Raja, K. B. (2009). High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security (IJCSS), 3(6), 462–472.
Rodriguez, B. M., II. (2008). Multi-class classification for identifying JPEG steganography embedding methods. Ph.D. dissertation, Air Force Institute of Technology, Ohio, United States.
Sallee, P. (2004). Model-Based Steganography Digital Watermarking. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg.
Samaratunge, S. G. K. D. N. (2007). New steganography technique for palette based images International Conference on Industrial and Information Systems, 2007. ICIIS 2007, Sri Lanka
Sandford Ii, M. T., Bradley, J. N., & Handel, T. G. (1996). Data embedding method. 226–259.
Shaou-Gang, M., Chin-Ming, H., Yuh-Show, T., & Hui-Mei, C. (2000). A secure data hiding technique with heterogeneous data-combining capability for electronic patient records. Paper presented at the Engineering in Medicine and Biology Society, 2000. Proceedings of the 22nd Annual International Conference of the IEEE.
Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16–22.
Shen, C., Zhang, H., Feng, D., Cao, Z., & Huang, J. (2007). Survey of information security. Science in China Series F: Information Sciences, 50(3), 273–298.
Shih, F. Y. (2007). Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, FL: Taylor & Francis.
Singh, R. P., Khan, M. A. A., Khan, M., & Singh, N. (2010). Spread spectrum image steganography in multimedia messaging service of mobile phones. International Journal of Electronics Engineering, 2(2), 365–369.
Smith, J. R., & Comiskey, B. O. (1996). Modulation and information hiding in images. Paper presented at the Proceedings of the First International Workshop on Information Hiding.
Solanki, K., Sarkar, A., & Manjunath, B. S. (2007). YASS: Yet another steganographic scheme that resists blind steganalysis. Paper presented at the Proceedings of the 9th international conference on Information hiding, Saint Malo, France.
Syed, Y. F. (1999). A low bit rate wavelet-based image coder for transmission over hybrid networks. The University of Texas at Arlington.
Syed, Y. F., & Rao, K. R. (1999, 24–27 Oct). Scalable low bit rate coding using an HC-RIOT coder. Paper presented at the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1999. Conference Record.
Tzschoppe, R., Baeuml, R., Huber, J., & Kaup, A. (2003). Steganographic system based on higher-order statistics. Paper presented at the Security and Watermarking of Multimedia Contents V, Santa Clara, California, USA.
Wang, C.-M., Wu, N.-I., Tsai, C.-S., & Hwang, M.-S. (2008). A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software, 81(1), 150–158.
Wayner, P. (2002). Disappearing cryptography information hiding: Steganography & watermarking. San Francisco: Morgan Kaufmann Publishers Inc ©2002 ISBN:1558607692.
Westfeld, A. (2001). F5—a steganographic algorithm: High capacity despite better steganalysis. Paper presented at the 4th International Workshop on Information Hiding Lecture Notes in Computer Science, Vol. 2137. Springer, Berlin, Heidelberg.
Westfeld, A., & Pfitzmann, A. (2000). Attacks on Steganographic systems. Lecture notes in computer science, Vol 1768. Berlin, Heidelber: Springer.
Widadi, K. C., Ainianta, P. H., & Chan Choong, W. (2005). Blind steganography using direct sequence/frequency hopping spread spectrum technique. Paper presented at the Fifth International Conference on Information, Communications and Signal Processing, 2005 Bangkok, Thailand.
Wu, D.-C., & Tsai, W.-H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613–1626.
Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings - Vision, Image and Signal Processing, 152(5), 611–615.
Xuefeng, W., Then, Y., & Chang-Tsun, L. (2005, 11–14 Sept). A palette-based image steganographic method using colour quantisation. Paper presented at the IEEE International Conference onimage processing, 2005. ICIP 2005 Genova, Italy.
Yang, C.-H., & Wang, S.-J. (2006). A steganographic method for digital images by multi-pixel differencing. Paper presented at the International Computer Symposium, Taipei, Taiwan.
Yesna, Y., Karen, P., & Sos, A. (2007). New quantization matrices for JPEG steganography. Paper presented at the Mobile Multimedia/Image Processing for Military and Security Applications 2007, USA.
Yi-Ta, W., & Shih, F. Y. (2006). Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 36(1), 24–31.
Yu, L., Zhao, Y., Ni, R., & Zhu, Z. (2008). PM1 steganography in JPEG images using genetic algorithm. Soft Computing, 13(4), 393–400.
Yu, Y.-H., Chang, C.-C., & Lin, I.-C. (2007). A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding, 107(3), 183–194.
Yue, L., Chang-Tsun, L., & Chia-Hung, W. (2007, 29–31 Aug). Protection of mammograms using blind steganography and watermarking. Paper presented at the Third international symposium on Information Assurance and Security, 2007. IAS 2007 Manchester, UK.
Yu-Kuen, H., Mei-Yi, W., & Jia-Hong, L. (2002). Hierarchic texture classification using statistical steganography techniques. Paper presented at the 14th International Conference on Digital Signal Processing, 2002. DSP 2002 Santorini, Greece, Greece.
Zamani, M., Manaf, A. B. A., & Abdullah, S. M. (2012). Correlation between PSNR and size ratio in audio steganography. Paper presented at the 11th International Conference on Telecommunications and Informatics. Proceedings of the 11th International Conference on Signal Processing, Saint Malo, Mont Saint-Michel, France.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Yahya, A. (2019). Steganography Techniques. In: Steganography Techniques for Digital Images. Springer, Cham. https://doi.org/10.1007/978-3-319-78597-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-78597-4_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78535-6
Online ISBN: 978-3-319-78597-4
eBook Packages: EngineeringEngineering (R0)