ABSTRACT
Steganography is the technique with which the confidential data is hidden under the cover medium such as image, without reflecting any clue on the cover image. Many algorithms are designed to provide the security for the communication of data over the Internet. The good steganographic algorithm is identified by the performance of the algorithm measured with the help of the parameters such as PSNR, MSE, robustness and capacity to hide the information in the cover image. This paper analyzed the Digital Image Steganographic algorithms in spatial and frequency domain.
- Chi-Kwong Chan, Cheng, L.M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition Society 37, pp. 469--474, Published by Elsevier Ltd.Google ScholarCross Ref
- Barni, M., (2001) "Improved Wavelet-Based Watermarking Through Pixel-Wise Masking", IEEE Transactions on Image Processing, Vol. 10, No. 5, ISSN: 1057-7149, pp. 783--791. Google ScholarDigital Library
- Fan-Hui Kong, (2009) "Image Retrieval using both Color and Texture Features", Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, IEEE, vol. 4, pp.12--15.Google Scholar
- Demirel, H., Jafari, G. A., (2011) "Image Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition", IEEE Transactions on Image Processing, Vol. 20, No.5, pp. 1458--1460. Google ScholarDigital Library
- Fang, J. Liu, Gu, W., Tang, Y., (2011) "A method to improve the image enhancement result based on image fusion", International Conference on Multimedia Technology (ICMT), Hangzhou, pp. 55--58.Google Scholar
- Provos, N. Honeyman, P., (2003) "Hide and seek: an introduction to steganography", Security & Privacy, IEEE Journals & Magazines, Vol. 1, no. 3, pp. 32--44. Google ScholarDigital Library
- Bender, D. G., Morimoto, N., Lu, A., (2010) "Techniques for data hiding", IBM Systems Journal, Vol. 35, No. 3 & 4, pp. 313--336. Google ScholarDigital Library
- Ker, A.D., (2005) "Steganalysis of LSB matching in grayscale images", Signal Processing Letters, IEEE, vol. 12, no.6, pp.441--444.Google Scholar
- Cheddad, A. Condell, J. Curran, K. McKevitt, P., (2010) "Digital image steganography: Survey and analysis of current methods", Signal Processing 90, pp. 727--752. Google ScholarDigital Library
- Yoo, J.-C., Ahn, C.W., (2012) "Image matching using peak signal-to-noise ratio-based occlusion detection", IEEE, Image Processing, IET, vol. 6, no. 5, pp. 483--495.Google Scholar
- Gonzalez, R.C., Woods, R.E., Eddins, S.L., (2010) "Digital Image Processing Using Matlab", Second Edition, Tata McGraw Hill Education Private Limited, New Delhi, ISBN-13: 978-0-07-070262-2. Google ScholarDigital Library
- Wu, D.-C., Tsai, W.-H., (2003) "A steganographic method for images by pixel-value differencing", Pattern Recognition Letters 24, Published by Elsevier, pp. 1613--1626. Google ScholarDigital Library
- Wang, H., Wang, S., (2004) "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, vol. 47, no. 10 Google ScholarDigital Library
- Marvel, L.M., Boncelet Jr., C.G., Retter, C., (1999) "Spread Spectrum Steganography", IEEE Transactions on image processing, vol. 8, no. 8. Google ScholarDigital Library
- Chan C. K., Cheng, L., (2004) "Hiding data in images by simple LSB substitution", Pattern Recognition Society, Published by Elsevier, vol. 37, no. 3, pp. 469--474.Google Scholar
- Hashad, A.I., Madani, A.S., Wahdan, A.E.M.A., (2005) "A robust steganography technique using discrete cosine transform insertion", Enabling Technologies for the New Knowledge Society: ITI 3rd International Conference on Information and Communications Technology, Cairo, pp. 255--264.Google ScholarCross Ref
- Sakr, A.S., Ibrahem, H.M., Abdullkader, H.M. Amin, M., (2012) "A steganographic method based on DCT and new quantization technique", 22nd International Conference on Computer Theory and Applications (ICCTA), Alexandria, pp. 187--191.Google ScholarCross Ref
- Kumar, V., Kumar, D., (2010) "Performance evaluation of DWT based image steganography", IEEE 2nd International Advance Computing Conference (IACC), Patiala, pp. 223--228.Google ScholarCross Ref
- Shejul, A.A., Kulkarni, U.L., (2010) "A DWT Based Approach for Steganography using Biometrics", International Conference on Data Storage and Data Engineering (DSDE), Bangalore, pp. 39--43. Google ScholarDigital Library
- Ghasemi, E. Shanbehzadeh J., ZahirAzami, B. (2011) "A steganographic method based on Integer Wavelet Transform and Genetic Algorithm", International Conference on Communications and Signal Processing (ICCSP), Calicut, pp. 42--45.Google ScholarCross Ref
- Hemalatha, S., Acharya, U.D., Renuka, A., Kamath, P.R. (2012) "A secure image steganography technique using Integer Wavelet Transform", World Congress on Information and Communication Technologies (WICT), Trivandrum, pp.755--758.Google ScholarCross Ref
- Sun, F. Liu. (2010) "Selecting Cover for Image Steganography by Correlation Coefficient", Second International Workshop on Education Technology and Computer Science (ETCS), Wuhan, vol.2, pp. 159--162.Google ScholarCross Ref
Recommendations
A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework
Digital WatermarkingIn this paper, a new watermarking scheme based on the multi-channel image watermarking framework is proposed, which is mainly used to resist geometric attacks. The multi-channel image watermarking framework generates a watermarking template from one of ...
Hiding Patients Confidential Datainthe ECG Signal viaa Transform-Domain Quantization Scheme
Watermarking is the most widely used technology in the field of copyright and biological information protection. In this paper, we use quantization based digital watermark encryption technology on the Electrocardiogram (ECG) to protect patient rights ...
A steganographic method based upon JPEG and quantization table modification
Special issue: Intelligent multimedia computing and networkingIn this paper, a novel steganographic method based on joint photographic expert-group (JPEG) is proposed. The proposed method modifies the quantization table first. Next, the secret message is hidden in the cover-image with its middle-frequency of the ...
Comments