Academia.eduAcademia.edu

Image Steganography

description351 papers
group1,091 followers
lightbulbAbout this topic
Image steganography is the practice of concealing information within an image file in such a way that the presence of the hidden data is undetectable to the observer. It involves techniques that manipulate the pixel values of the image to embed secret messages while maintaining the image's visual integrity.
lightbulbAbout this topic
Image steganography is the practice of concealing information within an image file in such a way that the presence of the hidden data is undetectable to the observer. It involves techniques that manipulate the pixel values of the image to embed secret messages while maintaining the image's visual integrity.

Key research themes

1. How can image steganography techniques optimize the trade-offs between imperceptibility, embedding capacity, and robustness?

This theme explores methods to enhance the core performance criteria of image steganography—imperceptibility (making the hidden data invisible to observers), embedding capacity (amount of secret data that can be hidden), and robustness (resistance against attacks such as compression, noise, and tampering). Managing these trade-offs is critical because improving one often degrades others, and securing data transmission requires balancing all three effectively.

Key finding: Proposed an integrated steganography technique combining Adaptive Pixel Differencing (APD) with edge direction analysis to adaptively embed data based on local pixel differences and locate embedding in edge regions. This... Read more
Key finding: Introduced an improved LSB substitution method using value difference metrics across diverse image types (RGB, gray scale, texture, aerial) that achieved up to 6.77% improvements in PSNR scores over existing methods. This... Read more
Key finding: Provided a critical analysis of spatial domain and transform domain steganography techniques, highlighting spatial domain’s efficiency in pixel-level embedding versus transform domain’s robustness. Survey emphasized the... Read more
Key finding: Developed a hash function based data embedding method that selects least significant bits non-sequentially across RGB pixel values, improving security against attacks and minimizing perceptible alterations. Evaluated with... Read more

2. What methodological innovations enhance security and key management in LSB-based image steganography?

This theme investigates advanced algorithmic mechanisms to secure the hidden data beyond simple LSB embedding — focusing on key management, encryption integration, data reshaping, and secure embedding strategies that resist unauthorized extraction. Innovations in this area aim to secure steganography against cryptanalysis and steganalysis attacks while maintaining efficiency and image quality.

Key finding: Presented a secure LSB steganography variant employing a 256-bit private key combined with a simple chaotic logistic map to determine embedding locations and message bit substitution indices. This approach scattered message... Read more
Key finding: Introduced a lightweight encryption scheme for steganographic messages based on reshaping the message binary matrix and applying column-wise left rotations determined by a private key. This single-round encryption-decryption... Read more
Key finding: Combined Huffman coding-based compression with multi-level encryption and embedding in the achromatic 'I' plane of HSI color space to increase security and imperceptibility. The scheme shuffled image blocks via magic matrix... Read more
Key finding: Proposed embedding messages into a secret image block selected and permuted using chaotic logistic maps driven by a 384-bit private key. By substituting rows and columns of the image block before embedding, the method... Read more

3. How do different image formats and multimedia types affect the design and effectiveness of image steganography algorithms?

This theme examines the impact of various image file formats (e.g., PNG, JPEG, TIFF, BMP) and multimedia types on the choice, adaptability, and performance of steganographic embedding algorithms. It is crucial because different formats and media have unique structural and compression properties that affect payload capacity, imperceptibility, and robustness. Algorithms that generalize across formats face particular challenges balancing these trade-offs.

Key finding: Developed a unified steganography algorithm capable of embedding secret messages effectively across major image formats including PNG, JPEG, TIFF, BMP, and GIF by tuning parameters such as Magic Matrix and Multi-Level... Read more
Key finding: Implemented an Android application that employs AES for encryption combined with image steganography embedding in common image formats (JPEG, PNG, BMP). The system integrated biometric authentication and key-based encryption... Read more
Key finding: Proposed an image steganography system targeting secure data sharing in cloud environments, combining Multi-Level Encryption Algorithms (MLEA, TLEA) with LSB embedding. The scheme was validated on standard image formats and... Read more
Key finding: Compared multiple image steganography software tools that support different algorithms and image input formats. Found that the choice of algorithm significantly affected output stego image quality, detectable distortion, and... Read more

All papers in Image Steganography

As the digital age is becoming an unavoidable part of our daily life people are becoming more concern about their privacy and security of their digital communications. Steganography and cryptography are the two most frequently used merits... more
Data protection has become one of the significant issues in cloud computing when end users must rely on their cloud providers for security purposes. Cloud providers never guarantee the security of data. One of the best ways to overcome... more
Aktivitas penggunaan internet semakin meningkat dilingkungan UIN Sunan Kalijaga Yogyakarta. Pertukaran informasi pun sudah banyak menggunakan media internet, salah satunya adalah menggunakan media e-mail (electronic mail). Namun seiring... more
inference rules and traditional Sobel method, a method is presented for edge detection in digital images with noise. In the proposed method, at first an image is scanned by a 2 × 2 mask and at each step of the survey 4 pixels are sent to... more
Keamanan pesan pada era modern ini sangat dibutuhkan. Perkembangan jaringan internet yang memungkinkan orang untuk saling bertukar data melalui jaringan internet. Seiring dengan perkembangan internet, kejahatan teknologi komunikasi dan... more
Steganography is the art of hiding of a message within another so that presence of hidden message is indistinguishable. The key concept behind steganography is that message to be transmitted is not detectable to the casual eye. This is... more
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret... more
1.1 Background and motivation Electronic voting has been discussed extensively in the academic literature, and in some places trials are being conducted as a precursor to implementing a large scale system. All of the systems of which we... more
A combination of cryptography and steganography is very important to information safety. Because together, they will not only hide but also encrypt the information at the same time. In the most crystographic studies, they hide the cipher... more
The literature has introduced many steganalysis methods intended to combat specific steganography techniques and to detect particular image formats. This paper proposes a detection system based on extracting histogram features. The... more
With the growing misuse of digital communication platforms, cybercriminals have started embedding malicious or deceptive messages within images using steganography, particularly through Least Significant Bit (LSB) techniques. Traditional... more
The Data Distribution Service (DDS) middleware is enjoying a rapid adoption in high-performance, mission-critical networks. At the same time, the H.264 Scalable Video Coding (SVC) has been recently standardized and it is deemed to be an... more
Steganography refers to the process of hiding secret message inside an appropriate multimedia carrier e.g. image, audio and video files. Today, by using of wireless communication more data are available electronically, which can leak from... more
Security and confidentiality of information are considered a requirement in today's communication media. Many people have used Internet to share and distribute confidential information. On the other hand, many malicious activities... more
This paper introduces a pioneering, effective data-hiding algorithm using different sizes of cover images and different types of secret data (image, txt, and audio). The proposed algorithm is based on a hybrid 1D chaotic map combined with... more
by Ahsan Ullah and 
1 more
Cloud computing allows for a simple, distributed pool of reconfigurable computers with widespread network connectivity. But maintaining data security and privacy is very difficult. In order to guarantee the privacy and security of data in... more
The proposed work addresses the imperative of safeguarding sensitive information through a dual-security approach of encryption and steganography. Employing the Advanced Encryption Standard (AES) for the first level, and bitmap graphics... more
IJCRT1892788 International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org 691 2LQR: A Way to Secure Private Information 1 Miss. Priyanka Kishor Trimbake, 2 Prof. Anuradha Narendra Nawathe ME , Associate Professor Department... more
Cloud computing allows for a simple, distributed pool of reconfigurable computers with widespread network connectivity. But maintaining data security and privacy is very difficult. In order to guarantee the privacy and security of data in... more
The growing possibilities of modern communication need the special means of security especially on computer network. Data security in the last few years has gained a wider audience. In this paper we have discussed a new steganographic... more
A secure LSB method of message steganography will be introduced, this method will use a private key of 256 bits length, this length will provide the required key space to protect the hidden message from being hacked, the private key will... more
In this study, the data hiding operations were performed by a combination of different sizes of Discrete Cosine Transform (DCT), Key Block Matrix (KBM) consisting of different sub-pattern blocks, and additional security algorithms. Mean... more
An efficient and highly secure method of secret message cryptography will be presented which based on the principle of playing cards shuffling. The method will be implemented in a selected number of layers, each layer will encrypt-decrypt... more
In this paper, we are going to discuss the problem of privacy protection in electronic data transfer systems . Electronic data is consist of video, image , and text . Providing protection is not sufficient for effective data transfer .it... more
Steganography is the art and science of secret communication. Various types of media, such as images, videos, audio etc. can be used to hide the message. This paper presents an approach to steganography using LBP on a cluster formed by... more
In this Paper, we present a new approach to protect digital images using the genetic algorithm using the image encryption technique. In genetic algorithms, the crossing operation assembles the existing genes and the mutation operation... more
In this paper, we will explore some of the theory and uses of the tensor product in the cryptography and steganography. We will look over a few brief examples of methods using tensor products in practice in the duration of this paper.
View metadata, citation and similar papers at core.ac.uk provided by Binus University Repository viii PRAKATA Puji dan syukur penulis panjatkan kepada Tuhan Yang Maha Esa atas segala berkat, rahmat dan bimbingan-Nya sehingga penulis dapat... more
Providing a simple and secure way to preserve confidential messages is crucial, given the widespread exchange of messages across various communication channels. This research paper presents a straightforward and effective method for... more
Steganography is the technique of hiding information so that any intermediate third party is unaware about the presence of secret message. Digital steganography uses some digital media as the cover for the secret message, like in our... more
A simple and efficient method of digital color image steganography will be introduced, the method will replace the popular color image used as a covering method in most recently existing method by a simple saw tooth periodic wave signal,... more
by Abd Al
The fast technology improvement in communication and information interchange systems, in the last few decades, has led a big problem. The problem a raised when modern machines produced enormous amount of data and the requirement for fast... more
The behavior of posting pictures on social network structures is befell everywhere and every single 2nd. for this reason, the conversation channels supplied through various social networks have a remarkable potential for covert verbal... more
Pencurian data yang terkandung dalam dokumen digital dapat dihindari dengan cara mengamankan file dokumen dengan menggunakan kriptografi. XXTEA sebagai salah satu algoritma kriptografi yang berbasis pada iterasi feistel merupakan solusi... more
Teknolojinin gelişmesi ile birlikte sayısal verilerin güvenli bir şekilde iletilmesi önemli bir hale gelmektedir. Şifreleme ve steganografi ile birlikte iletilecek veri alıcıya daha güvenli bir şekilde iletilebilmektedir. Bu çalışmada da... more
Gunumuzde teknolojinin gelismesiyle birlikte bilgi guvenligi oldukca onemli hale gelmistir. Dijital ortamda bulunan verilerin guvenligini saglamak icin sifreleme ve steganografi teknikleri kullanilmaktadir. Şifreleme ile mesaj, belirli... more
A Wavelet Watermarking and frequency domain feature based on adaptive watermarking algorithm is proposed. Many existing steganography methods hide more secret data into edged areas than smooth areas in the host image, which does not... more
The methods of image compression for storage in decentralized blockchain repositories, specifically in the IPFS system, are examined. A methodology for evaluating the efficiency of different image compression algorithms is proposed,... more
Protecting circulated via various transmission Medias secret messages from being hacked is vital issue. In this paper research an easy to implement and flexible to use method of message cryptography will be introduced. This method will be... more
A new efficient method of secret message steganography will be introduced; the method will use an image-block as a covering-stego media, this block will be secret and it will be determined by the selected private key. The image-block will... more
Security and confidentiality of information are considered a requirement in today's communication media. Many people have used Internet to share and distribute confidential information. On the other hand, many malicious activities... more
The rapid advancement of information and communication technology (ICT) has revolutionized communication and streamlined various tasks. With the widespread use of mobile phones by over 6 billion people globally, they have become the... more
Image steganography, the art of concealing information within an image, has evolved with the advancement of digital technology. Traditional methods of image steganography often face challenges related to imperceptibility, robustness, and... more
Steganography plays a vital role in achieving secret data security by embedding it into cover media. The cover media and the secret data can be text or multimedia, such as images, videos, etc. In this paper, we propose a novel... more
The growth of electronic services on the web, lead to the development of premier web applications that try to offer means of electronic democracy. Such aspects are: electronic elections, electronic debates, electronic pre-election... more
Download research papers for free!