Skip to main content

Steganography: A Survey

  • Conference paper
  • First Online:
Book cover Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

Due to the popularity of Internet and communication media, data security is one of the most focused areas of research. Cryptography and steganography are two important disciplines in the area of security. Image steganography is one of the techniques used to hide data inside an innocent image so that it is not visible to an eavesdropper while communication. This is a very useful technique when we transmit data from sender side to the receiver side. Many steganographic methods are suggested by the researchers struggling for good embedding capabilities and imperceptibility. This paper describes a survey on various image steganography techniques in spatial domains with their strengths and weaknesses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kipper G (2003) Investigator’s guide to steganography. crc press

    Google Scholar 

  2. Hussain M, Hussain M (2013) A survey of image steganography techniques. Int J Adv Sci Technol 54

    Google Scholar 

  3. Kale P, Bartere M (2015) A survey on image steganography technique. Int J Pure Appl Res Eng Technol 3(9):143–152

    Google Scholar 

  4. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626, Elsevier

    Article  Google Scholar 

  5. BrahmaTeja KN, Madhumati GL, Rao KRK (2012) Data hiding using EDGE based steganography. Int J Emerg Technol Adv Eng 2(11). Website: www.ijetae.com. ISSN 2250-2459

  6. Eason RO, Kawaguchi E (1998) Principle and applications of BPCS steganography. Proc SPIE 3528:464–473

    Google Scholar 

  7. Bhattacharyya S, Khan A, Nandi A, Dasmalakar A, Roy S, Sanyal G (2011) Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography. In: 2011 world congress on information and communication technologies, IEEE

    Google Scholar 

  8. Hussain M, Hussa M (2010) Pixel intensity based high capacity data embedding method 978-1-4244-8003-6/10 ©2010 IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shilpa Pund-Dange .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pund-Dange, S. (2018). Steganography: A Survey. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics