586 research outputs found

    A review and open issues of multifarious image steganography techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetch more attention due fast growth of using internet, it is applied for sending secret information by using different techniques. Steganography is one of major important technique in information hiding. Steganography is science of concealing the secure information within a carrier object to provide the secure communication though the internet, so that no one can recognize and detect it’s except the sender & receiver. In steganography, many various carrier formats can be used such as an image, video, protocol, audio. The digital image is most popular used as a carrier file due its frequency on internet. There are many techniques variable for image steganography, each has own strong and weak points. In this study, we conducted a review of image steganography in spatial domain to explore the term image steganography by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2014 to 2017. The aims of this review is provides an overview of image steganography and comparison between approved studies are discussed according to the pixel selection, payload capacity and embedding algorithm to open important research issues in the future works and obtain a robust method

    Edge-based image steganography

    Get PDF

    A Review on Edge Based Image Steganography

    Get PDF
    Security of the information has always been the interesting area for researchers. Integrity, Confidentiality, and Authentication are main security principles. There are so many techniques developed to achieve these security principles using cryptography. But all these techniques are unable to keep the communication secret. Although the attacker is unable to access the secret message but he knows about the existence of the message. To overcome this limitation of cryptography a new idea is proposed by researchers that is Steganography. Steganography is the art of concealing secret message in a carrier such as text, image, audio, video and protocol messages. Different Steganography techniques are used based on these carrier messages and way of hiding. The choice of these method is depends on the requirements of application. Some application requires huge data embedding and some require high secrecy. This paper gives a review on image Steganography based on edge detection and their comparative study. It also gives an overview of basic edge detection techniques

    Concepto de aristas múltiples empleado para esteganografía de imagen

    Get PDF
    Digital Steganography means hiding sensitive data inside a cover object ina way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustness against attacks. In some cases, weneed to take in account not just the invisibility but also we need to thinkabout other requirement which is the robustness of recovering the embedded secrete messages. In this paper we propose a new steganoraphicscheme that aims to achieve the robustness even the stego image attackedby steganalyzers. Furthermore, we proposed a scheme which is more robust against JPEG compression attack compared with other traditionalsteganography schemes

    Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm

    Get PDF
    The foremost priority in the information and communication technology era, is achieving an efficient and accurate steganography system for hiding information. The developed system of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography system is the main issue to be addressed. This study proposed an improved for embedding secret message into an image. This newly developed method is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select the pixel before random embedding to select block of (64 × 64) pixels, follows by the Knight Tour algorithm to select sub-block of (8 × 8) pixels, and finally by the random pixels selection. For secret embedding, Fibonacci sequence is implemented to decomposition pixel from 8 bitplane to 12 bitplane. The proposed method is distributed over the entire image to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. The results show good PSNR value with high capacity and these findings verified the worthiness of the proposed method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature

    Optimization of perceptual steganography capacity using the human visual system and evolutionary computation

    Full text link
    University of Technology Sydney. Faculty of Engineering and Information Technology.Efficient solutions for the purpose of delivery of information are called for by the revolution of internet. However concerns and problems over security, distribution of digital content and encapsulation of media artifacts have arisen as a result of these phenomenal developments. Hence, it has become necessary to seek capabilities to transport and secure multimedia with its meta-data in a safe way. Steganography has evolved as an enabler of multimedia applications keeping secret communication and embedded captioning secure. There is a tolerable outcome that occurs between imperceptibility and steganographic capacity that fit right into the mix. For instance, the more subtle elements are hidden within the cover object having higher capacity, the more degradation is exhibited towards the carrier file, resulting in an increase in the distortion attributed to the information being concealed and at the same time, decreasing the stego file quality. Suitable use of Evolutionary Algorithm and effective use of the weaknesses of Human Visual System in steganography are investigated in this thesis. Firstly, two high capacity steganography approaches are developed with the use of aforementioned features. The first method aims to overcome the limit capacity of edge based steganography in the spatial domain. The second method proposes a proper threshold selection for each coefficient which increase the capacity of transform domain. An estimate of the embedding rate based on image complexity is also proposed. Moreover, since peak signal-to-noise ratio (PSNR) is largely used as a measure of quality of images of stego, the reliability of current quality assessment metrics for stego images is also evaluated at the third stage. Follow by developing an Anticipatory Quality Assessment Metric for effective imperceptibility measurement. All proposed methods are aimed to assist the optimization of the statical and visual characteristics in the cover images while hiding large size of information. To reveal impressive imperceptibility and capacity of the proposed method over the existing dilemmas, a broad range of requirements have been carried out. To indicate the utility and value of all techniques proposed, they all have been empirically validated. The main aspects of image steganography are improved by the suggestions and methods, and are revealed by the results
    corecore