skip to main content
10.1145/2905055.2905294acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Analysis of Several Image Steganography Techniques in Spatial Domain: A Survey

Published: 04 March 2016 Publication History

Abstract

Steganography enables user to hide confidential data in any digital medium such that its existence cannot be concealed by the third party. Several research work is being is conducted to improve steganography algorithm's efficiency. Recent trends in computing technology use steganography as an important tool for hiding confidential data. This paper summarizes some of the research work conducted in the field of image steganography in spatial domain along with their advantages and disadvantages. Future research work and experimental results of some techniques is also being discussed. The key goal is to show the powerful impact of steganography in information hiding and image processing domain.

References

[1]
Anderson R.J., "Stretching the Limits of Steganography", Springer Lecture, pp. Notes in Computer Science, vol. 2 39--48, 1996.
[2]
Westfeld A, J., Camenish et al., "Steganography for Radio Amateurs- A DSSS Based Approach for Slow Scan Television", Springer-Verlag Berlin Heidelberg, pp. 201--215, 2007.
[3]
Timothy J. Ross, Fuzzy Logic with Engineering Applications, Third Edition Paperback -- March 1, 2010.
[4]
Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal, "A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier", Journal of Global Research in Computer Science(JGRCS), Volume 2, No. 4, April 2011.
[5]
Diwedi Samidha et al., "Random Image Steganography in Spatial Domain", IEEE, 2013.
[6]
C.V. Serdean, M. Tomlinson, J. Wade, A.M. Ambroze, "Protecting Intellectual Rights: Digital Watermarking in the wavelet domain", IEEE Int. Workshop Trends and Recent Achievements in IT, pp. 16--18, 2002.
[7]
Adnan Abdul-Aziz Gutub, "Pixel Indicator Technique for RGB Image Steganography", JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 1, FEBRUARY 2010.
[8]
Ankit Chaudhary et al., "A Hash Based Approach For Secure Keyless Steganography in Lossless RGB Images", IEEE, Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 3-5 Oct. 2012.
[9]
Gutub Adnan Abdul-Aziz. 2010. Pixel indicator technique for RGB image steganography. J. of Emerging Technologies in Web Intelligence. 2,1 (Feb. 2010), 56--64.
[10]
Roy, Sankar. and Parekh, Ranjan. 2011. A Secure Keyless Image Steganography Approach for Lossless RGB Images. In Proceedings of ACM ICCCS-2011 (Rourkela, Odhisha, India, Feb. 11-12, 2011), 573--576.
[11]
D.C. Wu. and W.H. Tsai. A steganographic method for images by pixel value differencing. Pattern Recognition Letters, 24:1613--1626, 2003.
[12]
R. Amritharajan, R. Akila, P. Deepikachowdavarapu, "A Comparative Analysis of Image Steganography", International Journal of Computer Applications, Vol. 2, No. 3, pp. 41--47, 2010.
[13]
K.C. Chang, C.P Chang, P.S. Huang, and T.M. Tu, "A Novel Image Steganographic Method Using Triway Pixel-Value Differencing," Journal of Multimedia, Vol. 3, No. 2, pp. 37--44, June 2008.
[14]
J.K. Mandal, Debashis Das "Steganography Using Adaptive Pixel Value Differencing (APVD) for Gray Images through Exclusion of Underflow/Overflow", Computer Science & Information Series, ISBN: 978-1-921987-03-8, pp. 93--102, 2012.
[15]
H.C. Wu, N.I. Wu, C.S. Tsai, and M.S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611--615, 2005.
[16]
V.Nagaraj et al., "Color Image Steganography based on Pixel Value Modification Method Using Modulus Function", International Conference on Electronic Engineering and Computer Science, Elsevier, 2013.
[17]
Ratnakirti Roy et al., "Chaos based Edge Adaptive Image Steganography", Elsevier nternational Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013.
[18]
Manglem Singh, Birendra Singh and Shyam Sundar Singh, "Hiding Encrypted Message in the Features of Images," IJCSNS, vol. 7, no. 4, April 2007.
[19]
H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," Proceedings of 2005 Instrument Electric Engineering, Vis. Images Signal Process, vol. 152, no. 5pp. 611--615, 2005.
[20]
Sonka, M., Hlavac, V. and Boyle, Image processing, analysis, and machine vision, Thomson Brooks/ Cole, 1999.
[21]
Wen-Jan Chen a, Chin-Chen Chang, T. Hoang Ngan Le, "High payload steganography mechanism using hybrid edge detector," Expert Systems with Applications, vol. 37, pp. 3292--3301, 2010.
[22]
John Canny," A computational approach to edge detection", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 8, No. 6, pp. 679--698, Nov. 1986.
[23]
V. I. Arnold; A. Avez, "Ergodic Problems in Classical Mechanics", Benjamin, New York, 1968.
[24]
Ron Crandall, "Some Notes on Steganography", Posted on Steganography Mailing List, 1998. Source: http://www.dia.unisa.it/~ads/corsosecurity/www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf.
[25]
X. Li, B. Yang, D. Cheng, and T. Zeng, "A generalization of lsb matching", IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69--72, 2009.
[26]
Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi, "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, April 2011, pp. 141--173.
[27]
a. L. M. Jean-Bernard Martens, "Image dissimilarity", Signal Processing, vol. 70, no. 3, pp. 155--176, 1998.
[28]
Yusra A. Y. Al-Najjar, Dr. Der Chen Soong, "Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI", International Journal of Scientific & Engineering Research, Volume 3, Issue 8, August-2012 ISSN 2229-5518.
[29]
V. K. Yadav, et al. "Zero Distortion Technique: An Approach to Image Steganography on color images". In Proc. International Conference on Information and Communication Technology for Competitive Strategies, ICTCS '14, November 14-16 pages 79--83 (Published by ICPS-ACM, Proceedings Volume ISBN No: 978-1-4503-3216-3).
[30]
V. K. Yadav, et al. "A Novel Approach of Bulk Data Hiding using Text Steganography". Accepted in Third International Conference on Recent Trends in Computing (ICRTC 2015) will be held in SRM University, NCR Campus, Modinagar, Ghaziabad, India during March 12th-13th, 2015". Publisher: Elsevier Procedia Computer Science Journal.
[31]
V. K. Yadav, et al. "Variable Text Generation: A Novel Technique to Generate Random Text". In Proc. Sixth International Conference on Computational Intelligence and Communication Networks 2014, CICN 2014, pages 102--105 (Available at IEEE Xplore).
[32]
V.K. Yadav, et al. "ICSECV: An Efficient Approach of Video Encryption". In Proc. Contemporary Computing (IC3), 2014 Seventh International Conference, 7-9 Aug. 2014, Pages: 425 --430 (Available at IEEE Xplorer and DBLP, indexed by SCOPUS).
[33]
V.K. Yadav, et al. "Zero Distortion Technique: An Approach to Image Steganography using Strength of Indexed Based Chaotic Sequence". In SSCC-2014, symposium proceedings published by Springer in Communications in Computer and Information Science Series(CCIS), Volume 467, 2014, pp 407--416, ISSN: 1865:0929.
[34]
V.K. Yadav, et al. "Hiding Large Amount of Data using a New Approach of Video Steganography". In Proc. Fourth International conference Confluence 2013: The Next Generation Information Technology Summit, Sept 27-28, Page(s): 337--343 (available at IET and IEEE xplorer).
[35]
V.K. Yadav, et al. "A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence". In Proc. Fourth International conference Confluence 2013: The Next Generation Information Technology Summit, Sept 27-28, Page(s): 139--143 (available at IET and IEEE xplorer).
[36]
V.K. Yadav, et al. "CUIM: An Approach to deal with Fake Accounts on facebook" In Proc. Second International Conference on "Emerging Research in Computing, Information, Communication and Applications", ERCICA-2014, Volume-1, pages 675--680 (Publisher: Elsevier, ISBN: 9789351072607).

Cited By

View all
  • (2023)A Comprehensive Study of Digital Image Steganographic TechniquesIEEE Access10.1109/ACCESS.2023.323739311(6770-6791)Online publication date: 2023
  • (2023)Metamorphic Cryptography Using Concept of Spiral Transposition and LSBs Approach Using Audio as Carrier MediumProceedings of 7th ASRES International Conference on Intelligent Technologies10.1007/978-981-99-1912-3_20(217-227)Online publication date: 6-Jul-2023
  • (2022)An Image-Based Information Hiding Approach with Chaotic Systems and Optimized SecurityCurrent Chinese Computer Science10.2174/26659972026662203291838062:1Online publication date: Apr-2022
  • Show More Cited By
  1. Analysis of Several Image Steganography Techniques in Spatial Domain: A Survey

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      March 2016
      843 pages
      ISBN:9781450339629
      DOI:10.1145/2905055
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 March 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Spatial domain
      2. distortion
      3. edge detection
      4. frequency domain
      5. intensity
      6. mean square error

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICTCS '16

      Acceptance Rates

      Overall Acceptance Rate 97 of 270 submissions, 36%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Comprehensive Study of Digital Image Steganographic TechniquesIEEE Access10.1109/ACCESS.2023.323739311(6770-6791)Online publication date: 2023
      • (2023)Metamorphic Cryptography Using Concept of Spiral Transposition and LSBs Approach Using Audio as Carrier MediumProceedings of 7th ASRES International Conference on Intelligent Technologies10.1007/978-981-99-1912-3_20(217-227)Online publication date: 6-Jul-2023
      • (2022)An Image-Based Information Hiding Approach with Chaotic Systems and Optimized SecurityCurrent Chinese Computer Science10.2174/26659972026662203291838062:1Online publication date: Apr-2022
      • (2022)A New Improved LSB Chaotic Image Steganography Scheme2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)10.1109/ElConRus54750.2022.9755617(332-335)Online publication date: 25-Jan-2022
      • (2022)Recent Trends for Practicing Steganography Using Audio as Carrier: A StudyAdvances in Data and Information Sciences10.1007/978-981-19-5292-0_52(549-555)Online publication date: 25-Nov-2022
      • (2022)DDNA: A Modified Concept to DNA CryptographyAdvances in Data and Information Sciences10.1007/978-981-16-5689-7_8(91-97)Online publication date: 1-Jan-2022
      • (2021)Implementation of Steganography in Speech Signal Using Spread Spectrum Modulation and Differential Method in Wireless Communication Systems2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA)10.1109/ICASEA53739.2021.9733069(213-218)Online publication date: 27-Oct-2021
      • (2020)LSB Substitution Image Steganography Based on Randomized Pixel Selection and One-Time Pad EncryptionProceedings of the 2020 2nd International Conference on Big-data Service and Intelligent Computation10.1145/3440054.3440055(1-6)Online publication date: 3-Dec-2020
      • (2020)Multi-Carrier Information Hiding Algorithm Based on Angle Structure DescriptorIEEE Access10.1109/ACCESS.2020.30065608(122565-122578)Online publication date: 2020
      • (2020)Analysis of various data security techniques of steganography: A surveyInformation Security Journal: A Global Perspective10.1080/19393555.2020.1801911(1-25)Online publication date: 12-Aug-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media