Abstract
With the expansion in digital-communication technologies and the rapid growth of network bandwidth, the Internet has turned out to be a commonly used channel for transmitting many documents—for instance, audio, video, image, and text—in digital form. Many practices have been offered and developed for providing the secure transmission of data. The focus of the current research is on the design of data-hiding techniques used for transmitting secret data where digital images are selected as the cover-media. This chapter has identified the problems in the present image-steganography schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amirtharajan, R., & Rayappan, J. B. B. (2012). Inverted pattern in inverted time domain for icon steganography. Information Technology Journal, 11(5), 587–595.
Bahi, J. M., Couchot, J. F., & Guyeux, C. (2012). Steganography: A class of secure and robust algorithms. Computer Journal, 55(6), 653–666.
Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.
Chang, C.-C., Chen, G.-M., & Lin, M.-H. (2004). Information hiding based on search-order coding for VQ indices. Pattern Recognition Letters, 25(11), 1253–1261.
Chang, C.-C., Lin, M.-H., & Hu, Y.-C. (2002). A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition and Artificial Intelligence, 16(04), 399–416.
Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2009). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89(12), 2324–2332.
Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.
Chen, G., Cao, M., Fu, D., & Ma, Q. (2011, August 16–18). Research on an Steganographic Algorithm Based on Image Edge. Paper presented at the Internet Technology and Applications (iTAP), 2011 International Conference on.
Chen, G., Zhang, M., Chen, J., Fu, D., & Wu, Y. (2012). Capacity and security for imperfect batch steganography. Możliwości i bezpieczeństwo niedoskonałej steganografii pakietowej, 88(7 B), 324–327.
Chi-Kwong, C., & Cheng, L. M. (2001). Improved hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters, 37(16), 1017–1018.
Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Chapter 12 – Steganography. In Digital Watermarking and Steganography (Second Edition) (pp. 425–467). Burlington: Morgan Kaufmann.
Fallahpour, M., & Sedaaghi, M. H. (2007). High capacity lossless data hiding based on histogram modification. IEICE Electronics Express, 4(7), 205–210.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). An improved robust and secured image Steganographic scheme. International Journal of Electronics and Communication Engineering & Technology (IJECET), 3(2), 484–496.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b). A comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues (IJCSI), 9(3), 110–116.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012c). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.
Hamid, N., Yahya, A., Ahmad, R. B, & Al-Qershi, O. M. (2012d, April 10–12). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st international conference on future communication network (ICFCN’12). IEEE international conference, Iraq, Baghdad.
Jae-Gil, Y., Eun-Joon, Y., Sang-Ho, S., & Kee-Young, Y. (2008, April 7–9). A New Image Steganography Based on 2k Correction and Edge-Detection. Paper presented at the Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on.
Katzenbeisser, S. C. (2000). Principles of steganography. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 17–41). Boston, London: Artech House.
Kharrazi, M. (2006). Image steganography and steganalysis. PhD Dissertation, Polytechnic University. (30250643)
Koppola, R. R. (2009). A high capacity data-hiding scheme in LSB-based image steganography. In University of Akron.
Lee, C. F., & Huang, Y. L. (2012). An efficient image interpolation increasing payload in reversible data hiding. Expert Systems with Applications, 39(8), 6712–6719.
Ling, L. S. (2005). Study of steganographic techniques for digital images. Master of Philosophy thesis, City University of Hong Kong, City University of Hong Kong.
Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142–172.
Marwaha, P. (2010, July 29–31). Visual cryptographic steganography in images. Paper presented at the Computing Communication and Networking Technologies (ICCCNT), 2010 International Conference on.
Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.
Ran-Zan, W., Chi-Fang, L., & Ja-Chen, L. (2000). Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters, 36(25), 2069–2070.
Shankar, T. N., Sahoo, G., & Niranjan, S. (2012). Steganographic manipulations with elliptic curve cryptography. International Journal of Electronic Security and Digital Forensics, 4(4), 280–297.
Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16–22.
Simmons, G. (1984). The Prisoners’ Problem and the Subliminal Channel. In D. Chaum (Ed.), Advances in Cryptology (pp. 51–67): Springer US.
Singh, K. M., Singh, L. S., Singh, A. B., & Devi, K. S. (2007). Hiding Secret Message in Edges of the Image. International Conference on Information and Communication Technology, 2007. ICICT ‘07 Egypt.
Widadi, K. C., Ainianta, P. H., & Chan Choong, W. (2005). Blind Steganography using Direct Sequence/Frequency Hopping Spread Spectrum Technique. Paper presented at the Information, Communications and Signal Processing, 2005 Fifth International Conference on.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Yahya, A. (2019). Introduction to Steganography. In: Steganography Techniques for Digital Images. Springer, Cham. https://doi.org/10.1007/978-3-319-78597-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-78597-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78535-6
Online ISBN: 978-3-319-78597-4
eBook Packages: EngineeringEngineering (R0)