Review Paper On Image Steganography
Review Paper On Image Steganography
Review Paper On Image Steganography
Abstract—Steganography refers to the data hiding. The main purpose of steganography is to hide the data behind
images. It means that it encrypts the text in the form of image. The steganography is done when the communication
takes place between sender and receiver [5]. Now a day’s in data transfer over the network, the security is the main
issue concerned with this. In order to secure the data while transmission steganography is used. Before the
development of the steganography, Security of the data is the main concern of research for the researchers. The
number of techniques was developed in order to secure transmission. Steganography use algorithms for hiding the
data. In this the data is hiding behind the cover image. The data is hidden character wise behind the pixels of the
image. The various algorithms or techniques used for steganography are LSB-Hash, RSA Encryption and Decryption
[5].
Keywords— Data hiding; Audio; Video; Text; Security; LSB; Encryption
I. INTRODUCTION
In this modern era, where technology is developing at fast pace and each day new developments are made, security is of
utmost priority. The data needs to be kept secure and safe so that it could be accessed only by the authorized personnel
and any unauthorized user cannot have any access of that data. Data sharing is increasing as thousands of messages and
data is being transmitted on internet everyday from one place to another. The protection of data is prime concern of the
sender. The need is that correct data should be sent but in a secret way that only the receiver should be able to understand
the message. At first technique of cryptography was invented to send secret messages over places. In cryptography the
message was encoded in another message in a covered way such that only the sender and receiver knew the way to
decrypt it [5]. A cryptographic key was used to decode the message that was known only by the authorized persons. The
limitation of cryptography was that other person came to know that the message had a hidden text in it and so the
probability of message being decoded by other person increased. To overcome this limitation the technique of
steganography was introduced.
The word steganography belongs to Greek language. In Greek the steganography stands for “covered writing”. The first
of all steganography was used in Greece. They use to enter the message on a wooden tablet and then apply wax on it to
hide the written data. The technique of steganography was far better than cryptography as in it the data was hidden in
image. The image was then sent over internet. It had advantage over cryptography as now the middle person does not
come to know whether data is hidden in the image or not. The data could only be decrypted from image by the authorized
person as he knows the phenomenon to decode it and had the authorized key with him that was required to decode the
data. The security and the reliability of data transmission also improved with invention of steganography as now no other
person could change the sent data. The main application fields of steganography are [4]:
Copyright Protection
Feature Tagging
Secret Communication
Use by terrorists
Digital Watermarking
Selected image to
hide data
Image after
steganography
Linguistic Technical
Steganography Steganography
A. LSB
LSB stands for Least Significant Bit. This is a technique for image steganography which works on the Least Significant
Bit value of the pixels. This technique does not lead to any kind of distortion in the image while embedding data behind
it. The value of least significant bit varies but this change is invisible to human eye. The LSB have many advantages such
as the image does not depreciated or distorted and by using LSB one can encrypt large amount of data behind an image.
It also poses some lacks also it is less robust in nature, sometimes changes in image can lead to the data lost, hidden data
can be revealed easily i.e. less secure. LSB transfers the data to the receivers end with security without allowing the
intruder to access the encrypted data [5].
B. Distortion Technique
Distortion technique encrypts the data by decoding it. In this original cover image is decoded into encrypted or distorted
cover image. In this technique the receiver applies a function on encrypted or decoded image in order to decrypt it. In this
steganography is applied by making distortions in image. This technique perform a sequence of alterations in cover
image. Then this sequence is applied for the purpose of comparing the encrypted message with forwarded message. The
data is encrypted behind randomly selected pixels. In case when the encrypted image vary from original image then bit
“1” is used else bit “0” is used. In this cover image is send to the receiver which is a barrier in the security provided by
this technique. It is a rule tat the cover image should always used for once while steganography if any cover image is
used more than once in steganography then it will easy for the intruders to attack the image for accessing the encrypted
data behind the image [5].
IV. CONCLUSION
Steganography is a technique of covering the data in such a way that the message could be transmitted secretly and only
the sender and receiver knows the way of decrypting that secret text or message. Steganography increases the security of
data to be transmitted and also ensures that only authorized personnel can have access to that message. This paper
presents a review of steganography and techniques that are used for steganography. Various papers have been reviewed
on steganography. It is studied that there is various types of steganography like text, audio, video, image, network or
protocol steganography [7]. This shows that text or data using steganography can be hidden in many ways. Techniques of
steganography have been reviewed and studied in the paper.
REFERENCES
[1] Amritpal Singh, “An Improved LSB based Image Steganography Technique for RGB Images”, Electrical,
Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on. IEEE, 2015.,
pp 1-4
[2] Mehdi Hussain, “A Survey of Image Steganography Techniques”, International Journal of Advanced Science
and Technology Vol. 54, May, 2013, pp 113-124
[3] T. Morkel, “AN OVERVIEW OF IMAGE STEGANOGRAPHY”, ISSA. 2005, pp 1-11
[4] R.Poornima, “AN OVERVIEW OF DIGITAL IMAGE STEGANOGRAPHY”, (IJCSES) Vol.4, No.1,February
2013, pp 23-31
[5] Anil Kumar, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”,
IJARCSSE, Volume 3, Issue 7, July 2013, pp 363-372
[6] Shaveta Mahajan, “A Review of Methods and Approach for Secure Stegnography”, IJARCSSE, Volume 2,
Issue 10, October 2012, pp 67-70
[7] Jasleen Kour, “Steganography Techniques –A Review Paper”, International Journal of Emerging Research in
Management &Technology, Volume-3, Issue-5, May 2014, pp 132-135
[8] Atallah M. Al-Shatnawi, “A New Method in Image Steganography with Improved Image Quality”, Applied
Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 – 3915
[9] C.P.Sumathi, “A Study of Various Steganographic Techniques Used for Information Hiding”, International
Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6, December 2013, pp 9-25
[10] Rashi Singh, “A Review on Image Steganography”, IJARCSSE, Volume 4, Issue 5, May 2014, pp 686-689
[11] Gunjan CHUGH, “IMAGE STEGANOGRAPHY TECHNIQUES: A REVIEW ARTICLE”, 2013. Fascicule 3
[July–September], pp 97-104
[12] Shikha Sharda, “Image Steganography: A Review”, IJETAE, Volume 3, Issue 1, January 2013
[13] Stuti Goel, “A Review of Comparison Techniques of Image Steganography”, Global Journal of Computer
Science and Technology Graphics & Vision Volume 13 Issue 4 Version 1.0 Year 2013, pp 8-14
[14] Rakhi, “A REVIEW ON STEGANOGRAPHY METHODS”, IJAREEIE, Vol. 2, Issue 10, October 2013, pp
4635-4638
[15] Anjali Tiwari, “A Review on Different Image Steganography Techniques”, IJEIT, Volume 3, Issue 7, January
2014, pp 121-124
[16] Prof.S.V.Kamble, “A Review on Novel Image Steganography Techniques”, IOSR-JCE, ISSN: 2278-0661,
ISBN: 2278-8727, PP: 01-04
[17] Amandeep Kaur, “A Review on Image Steganography Techniques”, International Journal of Computer
Applications (0975 – 8887) Volume 123 – No.4, August 2015, pp 20-24
[18] Abbas Cheddad, “Digital Image Steganography: Survey and Analysis of Current Methods”, Signal Processing,
Volume: 20, Issue: 3, March 2010, pp 727-752
[19] Soumyendu Das, “Steganography and Steganalysis: Different Approaches”