A Brief Study on Various Approaches of Image Steganography

Authors

  • Varun Maini  Assistant Professor, Department of Computer Science & Applications, S.U.S. Panjab University Constituent College Guru Harsahai, Punjab, India

Keywords:

Steganography, LSB, MSB, AI and Interpolation

Abstract

Steganography is the process that has been used for data hiding behind the cover object. In the process of steganography various types of steganography has been used so that information can be easily transmitted in secret manner. In this paper various approaches that have been used for data hiding process behind the images have been discussed. In the process of image steganography various approaches that are based on least significant bits, Random pixel based, interpolation based and AI based approaches have been used. In this paper a brief study has been discussed about these approaches that can be used for data hiding. Data integrity is the major concern in image steganography process. this has been achieved on the basis of different security measurements that are encryption of the secret information or interpolation of the secret information.

References

  1. Sahib Khan, “Analysis of Data hiding in R, G and B Channels of Color Image using Various Number of LSBs”, IEEE Conf. on Color image, 2016, pp 34-45.
  2. Kamaldeep Joshi “New Approach toward Data Hiding Using XOR for Image Steganography”, IEEE Conf. on XOR, 2016, pp 129-137.
  3. Getup, A. “Pixel Indicator Technique for RGB Image Steganography”, Journal of Emerging Technologies in Web Intelligence, Vol. 2, No.1,IEEE,2010, pp. 193-198.
  4. Marwaha and P. Marwaha, "Visual cryptographic steganography in images," 2010 Second International conference on Computing, Communication and Networking Technologies, Karur, 2010, pp. 1-6.
  5. Bailey, K. “An evaluation of image based Steganography methods”, Journal of Multimedia Tools and Applications, Vol. 30, No. 1, IEEE, 2006, pp. 55-88.
  6. Mahata, S.K. “A Novel Approach of Steganography using Hill Cipher”, International Conference on Computing, Communication and Sensor Network (CCSN), IEEE, 2012, pp. 0975-888.
  7. Chapman, M. Davida G, and Rennhard M. “A Practical and Effective Approach to Large Scale Automated Linguistic Steganography” found online at http://www.nicetext.com/doc/isc01.pdf.
  8. Mehboob, B. “A Steganography implementation”, Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium, ISSN 978-1-4244-2427-6, IEEE, 2008, pp.1–5.
  9. Marwaha, P. “Visual cryptographic Steganography in images”, Second International conference on Computing, Communication and Networking Technologies, IEEE, 2010, . 34-39.
  10. Bailey, K. “An evaluation of image based Steganography methods”, Journal of Multimedia Tools and Applications, Vol. 30, No. 1, IEEE, 2006, pp. 55-88.
  11. Mahata, S.K. “A Novel Approach of Steganography using Hill Cipher”, International Conference on Computing, Communication and Sensor Network (CCSN), IEEE, 2012, pp. 0975-888.
  12. Saravanan, V, Neeraja, A. “Security issues in computer networks and steganography”, IEEE 7th International Conference on Intelligent Systems and Control, pp. 363-366, 2013.

Downloads

Published

2017-11-30

Issue

Section

Research Articles

How to Cite

[1]
Varun Maini, " A Brief Study on Various Approaches of Image Steganography , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.1119-1124, November-December-2017.