Introduction to Steganography

  • Abid Yahya


With the expansion in digital-communication technologies and the rapid growth of network bandwidth, the Internet has turned out to be a commonly used channel for transmitting many documents—for instance, audio, video, image, and text—in digital form. Many practices have been offered and developed for providing the secure transmission of data. The focus of the current research is on the design of data-hiding techniques used for transmitting secret data where digital images are selected as the cover-media. This chapter has identified the problems in the present image-steganography schemes.


  1. Amirtharajan, R., & Rayappan, J. B. B. (2012). Inverted pattern in inverted time domain for icon steganography. Information Technology Journal, 11(5), 587–595.CrossRefGoogle Scholar
  2. Bahi, J. M., Couchot, J. F., & Guyeux, C. (2012). Steganography: A class of secure and robust algorithms. Computer Journal, 55(6), 653–666.CrossRefGoogle Scholar
  3. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.CrossRefGoogle Scholar
  4. Chang, C.-C., Chen, G.-M., & Lin, M.-H. (2004). Information hiding based on search-order coding for VQ indices. Pattern Recognition Letters, 25(11), 1253–1261.CrossRefGoogle Scholar
  5. Chang, C.-C., Lin, M.-H., & Hu, Y.-C. (2002). A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition and Artificial Intelligence, 16(04), 399–416.CrossRefGoogle Scholar
  6. Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2009). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89(12), 2324–2332.CrossRefGoogle Scholar
  7. Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.CrossRefGoogle Scholar
  8. Chen, G., Cao, M., Fu, D., & Ma, Q. (2011, August 16–18). Research on an Steganographic Algorithm Based on Image Edge. Paper presented at the Internet Technology and Applications (iTAP), 2011 International Conference on.Google Scholar
  9. Chen, G., Zhang, M., Chen, J., Fu, D., & Wu, Y. (2012). Capacity and security for imperfect batch steganography. Możliwości i bezpieczeństwo niedoskonałej steganografii pakietowej, 88(7 B), 324–327.Google Scholar
  10. Chi-Kwong, C., & Cheng, L. M. (2001). Improved hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters, 37(16), 1017–1018.CrossRefGoogle Scholar
  11. Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Chapter 12 – Steganography. In Digital Watermarking and Steganography (Second Edition) (pp. 425–467). Burlington: Morgan Kaufmann.CrossRefGoogle Scholar
  12. Fallahpour, M., & Sedaaghi, M. H. (2007). High capacity lossless data hiding based on histogram modification. IEICE Electronics Express, 4(7), 205–210.CrossRefGoogle Scholar
  13. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). An improved robust and secured image Steganographic scheme. International Journal of Electronics and Communication Engineering & Technology (IJECET), 3(2), 484–496.Google Scholar
  14. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b). A comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues (IJCSI), 9(3), 110–116.Google Scholar
  15. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012c). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.Google Scholar
  16. Hamid, N., Yahya, A., Ahmad, R. B, & Al-Qershi, O. M. (2012d, April 10–12). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st international conference on future communication network (ICFCN’12). IEEE international conference, Iraq, Baghdad.Google Scholar
  17. Jae-Gil, Y., Eun-Joon, Y., Sang-Ho, S., & Kee-Young, Y. (2008, April 7–9). A New Image Steganography Based on 2k Correction and Edge-Detection. Paper presented at the Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on.Google Scholar
  18. Katzenbeisser, S. C. (2000). Principles of steganography. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 17–41). Boston, London: Artech House.Google Scholar
  19. Kharrazi, M. (2006). Image steganography and steganalysis. PhD Dissertation, Polytechnic University. (30250643)Google Scholar
  20. Koppola, R. R. (2009). A high capacity data-hiding scheme in LSB-based image steganography. In University of Akron.Google Scholar
  21. Lee, C. F., & Huang, Y. L. (2012). An efficient image interpolation increasing payload in reversible data hiding. Expert Systems with Applications, 39(8), 6712–6719.CrossRefGoogle Scholar
  22. Ling, L. S. (2005). Study of steganographic techniques for digital images. Master of Philosophy thesis, City University of Hong Kong, City University of Hong Kong.Google Scholar
  23. Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142–172.Google Scholar
  24. Marwaha, P. (2010, July 29–31). Visual cryptographic steganography in images. Paper presented at the Computing Communication and Networking Technologies (ICCCNT), 2010 International Conference on.Google Scholar
  25. Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.MathSciNetCrossRefGoogle Scholar
  26. Ran-Zan, W., Chi-Fang, L., & Ja-Chen, L. (2000). Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters, 36(25), 2069–2070.CrossRefGoogle Scholar
  27. Shankar, T. N., Sahoo, G., & Niranjan, S. (2012). Steganographic manipulations with elliptic curve cryptography. International Journal of Electronic Security and Digital Forensics, 4(4), 280–297.CrossRefGoogle Scholar
  28. Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16–22.CrossRefGoogle Scholar
  29. Simmons, G. (1984). The Prisoners’ Problem and the Subliminal Channel. In D. Chaum (Ed.), Advances in Cryptology (pp. 51–67): Springer US.CrossRefGoogle Scholar
  30. Singh, K. M., Singh, L. S., Singh, A. B., & Devi, K. S. (2007). Hiding Secret Message in Edges of the Image. International Conference on Information and Communication Technology, 2007. ICICT ‘07 Egypt.Google Scholar
  31. Widadi, K. C., Ainianta, P. H., & Chan Choong, W. (2005). Blind Steganography using Direct Sequence/Frequency Hopping Spread Spectrum Technique. Paper presented at the Information, Communications and Signal Processing, 2005 Fifth International Conference on.Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Abid Yahya
    • 1
  1. 1.Faculty of Engineering & TechnologyBotswana International University of Science and TechnologyPalapyeBotswana

Personalised recommendations