A systematic overview of secure image steganography

Bakhan Tofiq Ahmed

Abstract


Information is a vital thing that needs to be secured and well protected during transmission between two or more parties over the internet. This can be achieved by steganography technology. Steganography is the science of concealing the information inside other information in a way that the concealed information cannot be detectable by the human eye. Many ways are available to hide information inside a cover media such as text, image, and audio steganography, but image steganography is the most popular among the others. Secure image steganography has a high-security level than traditional technique by combining steganography with cryptography due to encrypting secret information by cryptography algorithm before embedding it into the cover media by steganography algorithm. In this paper, a systematic review has been presented about secure image steganography and its renowned types. Many researchers proposed secure image steganography by using various cryptography and steganography algorithms which have been reviewed. The least significant bit (LSB) was one of the most renowned steganography algorithms which have been used by researchers due to its simplicity, while various cryptography algorithms like advanced encryption standard (AES) and blowfish have been used to propose secure image steganography in the reviewed papers. The comparison among the reviewed papers indicated that the LSB with hash-RSA gave a higher peak signal noise ratio (PSNR) value than the others which was 74.0189 dB.

References


B. T. Ahmed and O. Y. Abdulhameed, "Fingerprint recognition based on shark smell optimization and genetic algorithm," International Journal of Advances in Intelligent Informatics, vol. 6, no. 2, pp. 123-134, 2020. https://doi.org/10.26555/ijain.v6i2.502

B. T. Ahmed and O. Y. Abdulhameed, "Fingerprint Authentication using Shark Smell Optimization Algorithm," UHD Journal of Science Technology, vol. 4, no. 2, pp. 28-39, 2020. https://doi.org/10.21928/uhdjst.v4n2y2020.pp28-39

O. Shetye, C. Vanmali, M. Fernandes, and P. Patil, "Survey on Different Techniques of Image Steganography," International Journal of Computer Applications, vol. 138, no. 3, pp. 36-38, 2016. https://www.ijcaonline.org/research/volume138/number3/shetye-2016-ijca-908759.pdf

I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299-326, 2019. https://doi.org/10.1016/j.neucom.2018.06.075

O. Y. Abdulhammed, "Strengthening Steganoghraphy by Using Crow Search Algorithm of Fingerprint Image," Eastern-European Journal of Enterprise Technologies, vol. 2, no. 9, pp. 28-36, 2020. https://doi.org/10.15587/1729-4061.2020.200282

K. Bansal, A. Agrawal, and N. Bansal, "A survey on steganography using least significant bit (lsb) embedding approach," in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020, pp. 64-69: IEEE.

P. Pareek and N. Monica, "AN OVERVIEW OF STEGANOGRAPHY: DATA HIDING TECHNIQUE," International Research Journal of Engineering and Technology (IRJET) vol. 7, no. 1, pp. 87-89, 2020. https://d1wqtxts1xzle7.cloudfront.net/61982998/IRJET-V7I11620200203-40436-i3kh4z.pdf?1580792115=&response-content-disposition=inline%3B+filename%3DIRJET_AN_OVERVIEW_OF_STEGANOGRAPHY_DATA.pdf&Expires=1613391556&Signature=Oo-Xer21qw0Gr6xrGV1Lor0OmSpoJtSkMHYzY

R. Hegde and S. Jagadeesha, "Design and Implementation of Image Steganography by using LSB Replacement Algorithm and Pseudo Random Encoding Technique," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 7, pp. 4415-4420, 2015.

A. Kumar and R. Sharma, "A secure image steganography based on RSA algorithm and hash-LSB technique," International Journal of Advanced Research in Computer Science Software Engineering, vol. 3, no. 7, pp. 363-372, 2013. https://www.semanticscholar.org/paper/A-Secure-Image-Steganography-Based-on-RSA-Algorithm-Kumar-Sharma/730f93dddde06a0cd9bafdbe13312a80a62cb162

M. H. Sharma, M. MithleshArya, and M. D. Goyal, "Secure image hiding algorithm using cryptography and steganography," IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, vol. 13, no. 5, pp. 1-6, 2013. https://www.researchgate.net/publication/316683882_Secure_Image_Hiding_Algorithm_using_Cryptography_and_Steganography

J. K. Saini and H. K. Verma, "A hybrid approach for image security by combining encryption and steganography," in Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, 2013, pp. 607-611, https://doi.org/10.1109/ICIIP.2013.6707665: IEEE.

A. Nag, J. P. Singh, S. Biswas, D. Sarkar, and P. P. Sarkar, "A Huffman code based image steganography technique," in International Conference on Applied Algorithms, 2014, pp. 257-265, https://doi.org/10.1007/978-3-319-04126-1_22: Springer.

S. Singh and A. Datar, "Improved hash based approach for secure color image steganography using canny edge detection method," International Journal of Computer Science and Network Security (IJCSNS), vol. 15, no. 7, p. 92, 2015. http://paper.ijcsns.org/07_book/201507/20150715.pdf

S. D. M. Satar, N. A. Hamid, F. Ghazali, R. Muda, M. Mamat, and P. K. An, "Secure Image Steganography Using Encryption Algorithm," in Annual Int'l Conference on Intelligent Computing, Computer Science & Information Systems (ICCSIS-16), 2016, http://dx.doi.org/10.15242/IAE.IAE0416016

X. Zhou, W. Gong, W. Fu, and L. Jin, "An improved method for LSB based color image steganography combined with cryptography," in Computer and Information Science (ICIS), 2016 IEEE/ACIS 15th International Conference on, 2016, pp. 1-4, https://doi.org/10.1109/ICIS.2016.7550955: IEEE.

V. K. Sharma and D. K. Srivastava, "Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard," in Computing and Network Sustainabilityhttps://doi.org/10.1007/978-981-10-3935-5_36: Springer, 2017, pp. 353-360.

E. J. Kusuma, C. A. Sari, and E. H. Rachmawanto, "A combination of inverted LSB, RSA, and Arnold Transformation to get secure and imperceptible image steganography," Journal of ICT Research Applications, vol. 12, no. 2, pp. 103-122, 2018. DOI: 10.5614/itbj.ict.res.appl.2018.12.2.1

A. Tauhid, M. Tasnim, S. A. Noor, N. Faruqui, and M. A. Yousuf, "A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform," Journal of Information Security, vol. 10, no. 3, pp. 117-129, 2019. https://doi.org/10.4236/jis.2019.103007

A. Ahmed and A. Ahmed, "A Secure Image Steganography using LSB and Double XOR Operations," International Journal of Computer Science and Network Security (IJCSNS), vol. 20, no. 5, p. 139, 2020. https://www.researchgate.net/profile/Ali_Ahmed21/publication/342663405_A_Secure_Image_Steganography_using_LSB_and_Double_XOR_Operations/links/5eff3e2da6fdcc4ca4477e90/A-Secure-Image-Steganography-using-LSB-and-Double-XOR-Operations.pdf

C. Y. Roy and M. K. Goel, "Review on Image Steganography," Indian Journal of Science and Technology, vol. 9, no. 47, pp. 1-5, 2016. https://dx.doi.org/10.17485/ijst/2016/v9i47/106446

R. Poornima and R. Iswarya, "An overview of digital image steganography," International Journal of Computer Science and Engineering Survey, vol. 4, no. 1, p. 23, 2013. DOI : 10.5121/ijcses.2013.4102

(2021). Image Steganography Block Diagram. Available: https://image.slidesharecdn.com/ppt-sreelekshmis-151109062026-lva1-app6892/95/image-steganography-using-lsb-6-638.jpg?cb=1447050147 [Accessed 15.2.2021]

S. Kundra and N. Madaan, "A comparative study of image steganography techniques," International Journal of Science and Research (IJSR) Volume, vol. 3, no. 4, pp. 293-297, 2014. https://www.ijsr.net/search_index_results_paperid.php?id=7041402

A. Febryan, T. W. Purboyo, and R. E. Saputra, "Steganography methods on text, audio, image and video: A survey," International Journal of Applied Engineering Research, vol. 12, no. 21, pp. 10485-10490, 2017. https://www.ripublication.com/ijaer17/ijaerv12n21_04.pdf

F. M. Shelke, A. A. Dongre, and P. D. Soni, "Comparison of different techniques for Steganography in images," International Journal of Application or Innovation in Engineering & Management, vol. 3, no. 2, pp. 171-176, 2014. https://d1wqtxts1xzle7.cloudfront.net/33286931/IJAIEM-2014-02-27-062.pdf?1395545160=&response-content-disposition=inline%3B+filename%3DInternational_Journal_of_Application_or.pdf&Expires=1591901817&Signature=aEoQ6vMc5ruPkoyF5aegkq5LuQ7KARwmmyqOmfNiuXSdaQtE27pa6V2t8L9VswaDuZLa7jqpqzyK9PF6w3SJ7fqxIuArVktRL7CTey2khw13L40AAtY~l9oUDlzWesnxwdbS5zlVMND0ZipS2VEq9cS1yhse~E-cirwplYGSgD~obr7EUGxB~0TTcaeDhjVUzRztYeIeTTpHdJhRc1uElpH8mbUJS5QpziDsQpIr82taYDDVDQ5cC~zEgILcZrht5FM3VYIUWtqMSI26sZ2-qQL~GlRd-Khdw5dgZd5GuoVYUpBme6YMmjR5qveMdlqWh5xd-HcVaeDQ3nVjfNA4Vw__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

N. Menon, "A survey on image steganography," in 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy), 2017, pp. 1-5, https://doi.org/10.1109/TAPENERGY.2017.8397274: IEEE.

M. Hassaballah, M. A. Hameed, and M. H. Alkinani, "Introduction to digital image steganography," in Digital Media Steganography: Elsevier, 2020, pp. 1-15.

N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, "Image steganography techniques: an overview," International Journal of Computer Science and Security (IJCSS), vol. 6, no. 3, pp. 168-187, 2012.

P. Joseph and S. Vishnukumar, "A study on steganographic techniques," in Communication Technologies (GCCT), 2015 Global Conference on, 2015, pp. 206-210, https://doi.org/10.1109/GCCT.2015.7342653: IEEE.

S. S. Yadahalli, S. Rege, and R. Sonkusare, "Implementation and analysis of image steganography using Least Significant Bit and Discrete Wavelet Transform techniques," in 2020 5th International Conference on Communication and Electronics Systems (ICCES), 2020, pp. 1325-1330: IEEE.

M. K. Oudah, R. S. Khudhair, S. M. Kaleefah, and A. N. Abed, "Improvement of Image Steganography Using Discrete Wavelet Transform," Engineering and Technology Journal, vol. 38, no. 1A, pp. 83-87, 2020. https://doi.org/10.30684/etj.v38i1A.266

S. Dhawan and R. Gupta, "Analysis of various data security techniques of steganography: A survey," Information Security Journal: A Global Perspective, pp. 1-25, 2020. https://doi.org/10.1080/19393555.2020.1801911

R. Ruchi and U. Ghanekar, "A Brief Review on Image Steganography Techniques," in International Conference on Advances in Electronics, Electrical & Computational Intelligence (ICAEEC) 2019, https://dx.doi.org/10.2139/ssrn.3579269, 2020.

M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. Ho, and K.-H. Jung, "Image steganography in spatial domain: A survey," Signal Processing: Image Communication, vol. 65, pp. 46-66, 2018. https://doi.org/10.1016/j.image.2018.03.012.




DOI: http://doi.org/10.11591/ijaas.v10.i3.pp%25p

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

International Journal of Advances in Applied Sciences (IJAAS)
p-ISSN 2252-8814, e-ISSN 2722-2594


Web Analytics View IJAAS Stats