Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
This paper
delves into the realm of steganography, focusing on the evolution of techniques
employed to conceal data within digital images. Beginning with an exploration
of the motivations behind information security and the role of cryptography,
the paper introduces adaptive steganography as a discreet means of
incorporating private data into a cover medium. The discussion then shifts to
the three key factors in image steganography - resilience, capacity, and
imperceptibility - forming the foundation of effective data hiding. The spatial
and frequency domain methods are compared, with specific emphasis on the
classical Least Significant Bit insertion and more advanced adaptive
steganography techniques. The paper further introduces edge-based
steganography, highlighting the advantage of manipulating edge areas for
increased imperceptibility. Moving beyond definitions and types, the paper
provides a comprehensive analysis of notable research works in the field,
elucidating their objectives, methodologies, results, strengths, and
limitations. The conclusion reflects on the dynamic landscape of steganography,
acknowledging both achievements and areas for improvement.
Country : Iraq
IRJIET, Volume 8, Issue 1, January 2024 pp. 45-54
[1] R. D. Rashid and T. F. Majeed, “Edge based
image steganography: Problems and solution,” 2019 3rd Int. Conf. Commun.
Signal Process. their Appl. ICCSPA 2019, no. May, 2019, doi:
10.1109/ICCSPA.2019.8713712.
[2] R. Mohamad, “Data hiding by using AES Algorithm,” Wasit J.
Comput. Math. Sci., vol. 1, no. 4, pp. 112–119, 2022, doi:
10.31185/wjcm.82.
[3] D. Dongre and R. Mishra, “A Review on Edge Based Image
Steganography,” Int. J. Recent Innov. Trends Comput. Commun., vol. 2,
no. 9, pp. 2862–2866, 2014.
[4] N. Johnson, Z. Duric, S. Jajodia, and N. Memon, “Information
Hiding: Steganography and Watermarking—Attacks and Countermeasures,” J.
Electron. Imaging, vol. 10, p. 825, Jan. 2001, doi: 10.1117/1.1388610.
[5] H. Kolivand, T. C. Wee, S. Asadianfam, M. S. Rahim, and G.
Sulong, High imperceptibility and robustness watermarking scheme for brain
MRI using Slantlet transform coupled with enhanced knight tour algorithm,
no. 0123456789. Springer US, 2023. doi: 10.1007/s11042-023-16459-7.
[6] N. Akhtar, “An LSB Substitution with Bit Inversion Steganography
Method,” 2016, pp. 515–521. doi: 10.1007/978-81-322-2538-6_53.
[7] D. Baby, J. Thomas, G. Augustine, E. George, and N. R. Michael,
“A novel DWT based image securing method using steganography,” Procedia
Comput. Sci., vol. 46, no. Icict 2014, pp. 612–618, 2015, doi:
10.1016/j.procs.2015.02.105.
[8] H.-D. Yuan, “Secret sharing with multi-cover adaptive
steganography,” Inf. Sci. an Int. J., vol. 254, pp. 197–212, Jan. 2014,
doi: 10.1016/j.ins.2013.08.012.
[9] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital
image steganography: Survey and analysis of current methods,” Signal
Processing, vol. 90, no. 3, pp. 727–752, 2010, doi:
10.1016/j.sigpro.2009.08.010.
[10] N. Rabade and Y. S. Thakur, “Different
Steganography Techniques and Stego Keys Used in Digital Image Processing-a
Review,” Int. Res. J. Mod. Eng. Technol. Sci., no. 02, pp. 852–859,
2023.
[11] N. Hamid, A. Yahya, R. B. Ahmad, and O. M.
Al-Qershi, “Image steganography techniques: an overview,” Int. J. Comput.
Sci. Secur., vol. 6, no. 3, pp. 168–187, 2012.
[12] Shikha and V. K. Dutt, “Steganography : The
Art of Hiding Text in Image using Matlab,” Int. J. Adv. Res. Comput. Sci.
Softw. Eng., vol. 4, no. 9, pp. 822–828, 2014.
[13] M. S. Abuali, C. B. M. Rashidi, M. H. Salih,
R. A. A. Raof, and S. S. Hussein, “Digital image steganography in spatial
domain a comprehensive review,” J. Theor. Appl. Inf. Technol., vol. 97,
no. 19, pp. 5081–5102, 2019.
[14] M. Hassaballah, M. A. Hameed, and M. H.
Alkinani, “Introduction to digital image steganography,” Digit. Media
Steganography Princ. Algorithms, Adv., pp. 1–15, 2020, doi:
10.1016/B978-0-12-819438-6.00009-8.
[15] G. Yadav and A. Ojha, “Improved security in
the genetic algorithm-based image steganography scheme using Hilbert
space-filling curve,” Imaging Sci. J., vol. 67, pp. 1–11, Feb. 2019,
doi: 10.1080/13682199.2019.1570678.
[16] R. Din et al., “Evaluating the
Feature-Based Technique of Text Steganography Based on Capacity and Time
Processing Parameters,” Adv. Sci. Lett., vol. 24, pp. 7355–7359, Oct.
2018, doi: 10.1166/asl.2018.12941.
[17] S. Bobade and R. Goudar, “Secure Data
Communication Using Protocol Steganography in IPv6,” in 2015 International
Conference on Computing Communication Control and Automation, 2015, pp.
275–279. doi: 10.1109/ICCUBEA.2015.59.
[18] C. Han, R. Xue, R. Zhang, and X. Wang, “A new
audio steganalysis method based on linear prediction,” Multimed. Tools Appl.,
vol. 77, pp. 1–25, Jun. 2018, doi: 10.1007/s11042-017-5123-x.
[19] P. Malathi, M. Manoaj, R. Manoj, V. Raghavan,
and R. E. Vinodhini, “Highly Improved DNA Based Steganography,” Procedia
Comput. Sci., vol. 115, pp. 651–659, 2017, doi:
10.1016/j.procs.2017.09.151.
[20] M. Kasthuri, “Performance analysis of gradient
based image edge detection,” Int. J. Health Sci. (Qassim)., vol. 6, no.
June, pp. 2272–2278, 2022, doi: 10.53730/ijhs.v6ns5.9134.
[21] J. A. M. Saif, M. H. Hammad, and I. A. A.
Alqubati, “Gradient Based Image Edge Detection,” Int. J. Eng. Technol.,
vol. 8, no. 3, pp. 153–156, 2016, doi: 10.7763/ijet.2016.v6.876.
[22] G. M. H. Amer and A. M. Abushaala, “Edge
detection methods,” 2015 2nd World Symp. Web Appl. Networking, WSWAN 2015,
no. April, 2015, doi: 10.1109/WSWAN.2015.7210349.
[23] S. Krig, “Image Pre-Processing BT - Computer Vision Metrics: Survey, Taxonomy,
and Analysis,” S. Krig, Ed., Berkeley, CA: Apress, 2014, pp. 39–83. doi:
10.1007/978-1-4302-5930-5_2.
[24] S. Saluja, A. K. Singh, S. Agrawal, M. E.
Scholar, I. Bhilai, and S. Asst, “A Study of Edge Detection Methods,” Int.
J. Adv. Res. Comput. Commun. Eng., vol. 2, no. 1, pp. 994–999, 2013,
[Online]. Available: www.ijarcce.com
[25] A. Jan, S. A. Parah, and B. A. Malik, “A novel
laplacian of gaussian (LoG) and chaotic encryption based image steganography
technique,” 2020 Int. Conf. Emerg. Technol. INCET 2020, no. June, 2020,
doi: 10.1109/INCET49848.2020.9154173.
[26] X. Wang and J.-Q. Jin, An Edge Detection
Algorithm Based on Improved CANNY Operator. 2007. doi: 10.1109/ISDA.2007.6.
[27] J. Liu et al., “Image Edge Recognition
of Virtual Reality Scene Based on Multi-Operator Dynamic Weight Detection,” IEEE
Access, vol. 8, pp. 111289–111302, 2020, doi: 10.1109/ACCESS.2020.3001386.
[28] K. Hempstalk, “Hiding behind corners: Using
edges in images for better steganography,” Researchgate.Net, no. January
2006, 2006, [Online]. Available:
https://www.researchgate.net/profile/Kathryn-Hempstalk/publication/241605558_Hiding_Behind_Corners_Using_Edges_in_Images_for_Better_Steganography/links/541fdafe0cf241a65a1acad4/Hiding-Behind-Corners-Using-Edges-in-Images-for-Better-Steganography.pdf
[29] M. R. Modi, S. Islam, and P. Gupta, “Edge
Based Steganography on Colored Images BT
- Intelligent Computing Theories,” D.-S. Huang, V. Bevilacqua, J. C.
Figueroa, and P. Premaratne, Eds., Berlin, Heidelberg: Springer Berlin
Heidelberg, 2013, pp. 593–600.
[30] P. B. Chanda, S. Datta, S. Mukherjee, and J.
P. Choudhury, “Comparative Study on Different Image Steganography Based Edge
Detection,” Int. J. Innov. Res. Sci. Eng. Technol., pp. 220–226, 2016.
[31] H.-C. Wu, N.-I. Wu, C.-S. Tsai, and M.-S.
Hwang, “Image steganographic scheme based on pixel-value differencing and LSB
replacement methods,” Vision, Image Signal Process. IEE Proc. -, vol.
152, pp. 611–615, Nov. 2005, doi: 10.1049/ip-vis:20059022.
[32] H. Motameni, M. Norouzi, M. Jahandar, and A.
Hatami, “Labeling Method in Steganography,” World Acad. Sci. Eng. Technol.
Int. J. Comput. Electr. Autom. Control Inf. Eng., vol. 1, pp. 1600–1605,
2007, [Online]. Available: https://api.semanticscholar.org/CorpusID:9357037
[33] M. T. Parvez and A. A.-A. Gutub, “RGB
Intensity Based Variable-Bits Image Steganography,” in 2008 IEEE
Asia-Pacific Services Computing Conference, 2008, pp. 1322–1327. doi:
10.1109/APSCC.2008.105.
[34] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M.
Sun, “Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain
Systems,” IEEE Trans. Inf. Forensics Secur., vol. 3, no. 3, pp. 488–497,
2008, doi: 10.1109/TIFS.2008.926097.
[35] W. Puech, M. Chaumont, and O. Strauss, “A
reversible data hiding method for encrypted images,” Secur. Forensics,
Steganography, Watermarking Multimed. Contents X, vol. 6819, no. March
2008, p. 68191E, 2008, doi: 10.1117/12.766754.
[36] L. Li, B. Luo, Q. Li, and X. Fang, “A Color
Images Steganography Method by Multiple Embedding Strategy Based on Sobel
Operator,” in 2009 International Conference on Multimedia Information
Networking and Security, 2009, pp. 118–121. doi: 10.1109/MINES.2009.187.
[37] W.-J. Chen, C.-C. Chang, and T. Le Hoang,
“High payload steganography mechanism using hybrid edge detector,” Expert
Syst. Appl., vol. 37, pp. 3292–3301, Apr. 2010, doi:
10.1016/j.eswa.2009.09.050.
[38] A. Gutub, “Pixel Indicator Technique for RGB
Image Steganography,” J. Emerg. Technol. Web Intell., vol. 2, Feb. 2010,
doi: 10.4304/jetwi.2.1.56-64.
[39] W. Luo, F. Huang, and J. Huang, “Edge adaptive
image steganography based on lsb matching revisited,” IEEE Trans. Inf.
Forensics Secur., vol. 5, no. 2, pp. 201–214, 2010, doi:
10.1109/TIFS.2010.2041812.
[40] C.-M. Yu, K.-C. Wu, and C.-M. Wang, “A
distortion-free data hiding scheme for high dynamic range images,” Displays,
vol. 32, no. 5, pp. 225–236, 2011, doi:
https://doi.org/10.1016/j.displa.2011.02.004.
[41] X. Liao, Q. Y. Wen, and J. Zhang, “A
steganographic method for digital images with four-pixel differencing and
modified LSB substitution,” J. Vis. Commun. Image Represent., vol. 22,
no. 1, pp. 1–8, 2011, doi: 10.1016/j.jvcir.2010.08.007.
[42] M. Hussain and M. Hussain, “Information hiding
using edge boundaries of objects,” Int. J. Secur. its Appl., vol. 5, no.
3, pp. 1–10, 2011.
[43] Y. Bassil, “Image Steganography based on a
Parameterized Canny Edge Detection Algorithm,” Int. J. Comput. Appl.,
vol. 60, no. 4, pp. 35–40, 2012, doi: 10.5120/9682-4112.
[44] M. Mahajan and N. Kaur, “Let’s Play with
Images and Private Data Using Stick of Randomness BT - Global Trends in Information Systems and
Software Applications,” P. V. Krishna, M. R. Babu, and E. Ariwa, Eds., Berlin,
Heidelberg: Springer Berlin Heidelberg, 2012, pp. 619–628.
[45] M. Hussain, “A Survey of Image Steganography
Techniques,” Int. J. Adv. Sci. Technol. (IJAST), vol. 54, pp. 113–125,
May 2013.
[46] V. Nagaraj, V. Vijayalakshmi, and G. Zayaraz,
“Color Image Steganography based on Pixel Value Modification Method Using
Modulus Function,” IERI Procedia, vol. 4, pp. 17–24, 2013, doi:
10.1016/j.ieri.2013.11.004.
[47] J.-Y. Yan, T.-H. Chen, and C.-H. Lin, “Encryption
in High Dynamic Range Images for RGBE Format,” in 2013 Ninth International
Conference on Intelligent Information Hiding and Multimedia Signal Processing,
2013, pp. 493–496. doi: 10.1109/IIH-MSP.2013.128.
[48] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li,
“Reversible Data Hiding in Encrypted Images by Reserving Room Before
Encryption,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 3, pp.
553–562, 2013, doi: 10.1109/TIFS.2013.2248725.
[49] D. Singla and M. Juneja, “An analysis of edge
based image steganography techniques in spatial domain,” 2014 Recent Adv.
Eng. Comput. Sci. RAECS 2014, vol. 1, no. 2, 2014, doi:
10.1109/RAECS.2014.6799604.
[50] H. Al-Dmour and A. Al-Ani, “A Steganography
Embedding Method Based on Edge Identification and XOR Coding,” Expert Syst.
Appl., vol. 46, Oct. 2015, doi: 10.1016/j.eswa.2015.10.024.
[51] Y.-T. Lin, C.-M. Wang, W.-S. Chen, F.-P. Lin,
and W. Lin, “A Novel Data Hiding Algorithm for High Dynamic Range Images,” IEEE
Trans. Multimed., vol. 19, no. 1, pp. 196–211, 2017, doi:
10.1109/TMM.2016.2605499.
[52] P. Puteaux and W. Puech, “An Efficient MSB
Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted
Images,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 7, pp.
1670–1681, 2018, doi: 10.1109/TIFS.2018.2799381.
[53] X. Gao, Z. Pan, E. Gao, and G. Fan,
“Reversible data hiding for high dynamic range images using two-dimensional
prediction-error histogram of the second time prediction,” Signal Processing,
vol. 173, p. 107579, 2020, doi: https://doi.org/10.1016/j.sigpro.2020.107579.
[54] C. F. Lan, C. M. Wang, and W. Lin, “XtoE: A
Novel Constructive and Camouflaged Adaptive Data Hiding and Image Encryption
Scheme for High Dynamic Range Images,” Appl. Sci., vol. 12, no. 24,
2022, doi: 10.3390/app122412856.
[55] X. Wang, C.-C. Chang, C.-C. Lin, and C.-C.
Chang, “Reversal of pixel rotation: A reversible data hiding system towards
cybersecurity in encrypted images,” J. Vis. Commun. Image Represent.,
vol. 82, p. 103421, 2022, doi: https://doi.org/10.1016/j.jvcir.2021.103421.
[56] Y.-Y. Tsai, H.-L. Liu, P.-L. Kuo, and C.-S.
Chan, “Extending Multi-MSB Prediction and Huffman Coding for Reversible Data
Hiding in Encrypted HDR Images,” IEEE Access, vol. 10, pp. 49347–49358,
2022, doi: 10.1109/ACCESS.2022.3171578.
[57] K. S. Hsieh and C. M. Wang, “Multi-Hider
Reversible Data Hiding Using a Weighted Color Transfer and Modulus Operation,” Appl.
Sci., vol. 13, no. 2, 2023, doi: 10.3390/app13021013.