Skip to main content

Introduction to Steganography

  • Chapter
  • First Online:
Steganography Techniques for Digital Images

Abstract

With the expansion in digital-communication technologies and the rapid growth of network bandwidth, the Internet has turned out to be a commonly used channel for transmitting many documents—for instance, audio, video, image, and text—in digital form. Many practices have been offered and developed for providing the secure transmission of data. The focus of the current research is on the design of data-hiding techniques used for transmitting secret data where digital images are selected as the cover-media. This chapter has identified the problems in the present image-steganography schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Amirtharajan, R., & Rayappan, J. B. B. (2012). Inverted pattern in inverted time domain for icon steganography. Information Technology Journal, 11(5), 587–595.

    Article  Google Scholar 

  • Bahi, J. M., Couchot, J. F., & Guyeux, C. (2012). Steganography: A class of secure and robust algorithms. Computer Journal, 55(6), 653–666.

    Article  Google Scholar 

  • Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.

    Article  Google Scholar 

  • Chang, C.-C., Chen, G.-M., & Lin, M.-H. (2004). Information hiding based on search-order coding for VQ indices. Pattern Recognition Letters, 25(11), 1253–1261.

    Article  Google Scholar 

  • Chang, C.-C., Lin, M.-H., & Hu, Y.-C. (2002). A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition and Artificial Intelligence, 16(04), 399–416.

    Article  Google Scholar 

  • Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2009). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89(12), 2324–2332.

    Article  Google Scholar 

  • Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.

    Article  Google Scholar 

  • Chen, G., Cao, M., Fu, D., & Ma, Q. (2011, August 16–18). Research on an Steganographic Algorithm Based on Image Edge. Paper presented at the Internet Technology and Applications (iTAP), 2011 International Conference on.

    Google Scholar 

  • Chen, G., Zhang, M., Chen, J., Fu, D., & Wu, Y. (2012). Capacity and security for imperfect batch steganography. Możliwości i bezpieczeństwo niedoskonałej steganografii pakietowej, 88(7 B), 324–327.

    Google Scholar 

  • Chi-Kwong, C., & Cheng, L. M. (2001). Improved hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters, 37(16), 1017–1018.

    Article  Google Scholar 

  • Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. (2008). Chapter 12 – Steganography. In Digital Watermarking and Steganography (Second Edition) (pp. 425–467). Burlington: Morgan Kaufmann.

    Chapter  Google Scholar 

  • Fallahpour, M., & Sedaaghi, M. H. (2007). High capacity lossless data hiding based on histogram modification. IEICE Electronics Express, 4(7), 205–210.

    Article  Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). An improved robust and secured image Steganographic scheme. International Journal of Electronics and Communication Engineering & Technology (IJECET), 3(2), 484–496.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b). A comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues (IJCSI), 9(3), 110–116.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012c). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B, & Al-Qershi, O. M. (2012d, April 10–12). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st international conference on future communication network (ICFCN’12). IEEE international conference, Iraq, Baghdad.

    Google Scholar 

  • Jae-Gil, Y., Eun-Joon, Y., Sang-Ho, S., & Kee-Young, Y. (2008, April 7–9). A New Image Steganography Based on 2k Correction and Edge-Detection. Paper presented at the Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on.

    Google Scholar 

  • Katzenbeisser, S. C. (2000). Principles of steganography. In S. Katzenbeisser & F. A. P. Petitcolas (Eds.), Information hiding techniques for steganography and digital watermarking (pp. 17–41). Boston, London: Artech House.

    Google Scholar 

  • Kharrazi, M. (2006). Image steganography and steganalysis. PhD Dissertation, Polytechnic University. (30250643)

    Google Scholar 

  • Koppola, R. R. (2009). A high capacity data-hiding scheme in LSB-based image steganography. In University of Akron.

    Google Scholar 

  • Lee, C. F., & Huang, Y. L. (2012). An efficient image interpolation increasing payload in reversible data hiding. Expert Systems with Applications, 39(8), 6712–6719.

    Article  Google Scholar 

  • Ling, L. S. (2005). Study of steganographic techniques for digital images. Master of Philosophy thesis, City University of Hong Kong, City University of Hong Kong.

    Google Scholar 

  • Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142–172.

    Google Scholar 

  • Marwaha, P. (2010, July 29–31). Visual cryptographic steganography in images. Paper presented at the Computing Communication and Networking Technologies (ICCCNT), 2010 International Conference on.

    Google Scholar 

  • Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.

    Article  MathSciNet  Google Scholar 

  • Ran-Zan, W., Chi-Fang, L., & Ja-Chen, L. (2000). Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters, 36(25), 2069–2070.

    Article  Google Scholar 

  • Shankar, T. N., Sahoo, G., & Niranjan, S. (2012). Steganographic manipulations with elliptic curve cryptography. International Journal of Electronic Security and Digital Forensics, 4(4), 280–297.

    Article  Google Scholar 

  • Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16–22.

    Article  Google Scholar 

  • Simmons, G. (1984). The Prisoners’ Problem and the Subliminal Channel. In D. Chaum (Ed.), Advances in Cryptology (pp. 51–67): Springer US.

    Chapter  Google Scholar 

  • Singh, K. M., Singh, L. S., Singh, A. B., & Devi, K. S. (2007). Hiding Secret Message in Edges of the Image. International Conference on Information and Communication Technology, 2007. ICICT ‘07 Egypt.

    Google Scholar 

  • Widadi, K. C., Ainianta, P. H., & Chan Choong, W. (2005). Blind Steganography using Direct Sequence/Frequency Hopping Spread Spectrum Technique. Paper presented at the Information, Communications and Signal Processing, 2005 Fifth International Conference on.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yahya, A. (2019). Introduction to Steganography. In: Steganography Techniques for Digital Images. Springer, Cham. https://doi.org/10.1007/978-3-319-78597-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78597-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78535-6

  • Online ISBN: 978-3-319-78597-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics