Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 8 , Issue 1 , PP: 08-15, 2022 | Cite this article as | XML | Html | PDF | Full Length Article

Image Steganography Based Spatial and Transform Domain Techniques: A Review

Amar Y. Hussien 1 *

  • 1 Researcher, Department of Statistics, Duhok, Iraq - (amar.yehya85@gmail.com)
  • Doi: https://doi.org/10.54216/FPA.080101

    Received: April 13, 2022 Accepted: July 22, 2022
    Abstract

    The amount of data shared online today is increasing. Data security is therefore cited as a significant problem while processing data exchanges through the Internet. Everyone needs the security of their data during communication processes. The science and art of steganography is the concealment of one audio, message, video, or image by embedding another audio, message, video, or image in its place. It is employed to protect sensitive data against malicious assaults. In order to detect the numerous methods employed with digital steganography, this study seeks to identify the primary image-based mediums. As a result, in the spatial domain of the digital medium, the LSB approach was mostly employed, whereas in the transform domain, DTC and DWT were separated as the primary techniques. Due to its simplicity and large embedding capacity, the spatial domain was the most frequently used domain in digital steganography.

    Keywords :

    Information Security , Image Steganography , Spatial Domain , Transform Domain.

    References

    [1] Beroual, Abdesselam, and Imad Fakhri Al- Shaikhli. "A Review of Steganographic Methods and Techniques." International Journal on Perceptive and Cognitive Computing 4.1 (2018): 1-6.

    [2] Zebari, N. A., Zebari, D. A., Zeebaree, D. Q., & Saeed, J. N. (2021). Significant features for steganography techniques using deoxyribonucleic acid: a review. Indonesian Journal of Electrical Engineering and Computer Science, 21(1), 338-347.

    [3] I. J. Kadhim, P. Premaratne, P. J. Vial and B. Halloran. (2019). ―Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research,‖ Neurocomputing, vol. 335, pp. 299–326.

    [4] Z. Wang, N. Gao, X. Wang, X. Qu, and L. Li, ‗‗SSteGAN: Self- learning steganography based on generative adversarial networks,‘‘ in Proc. Int. Conf. Neural Inf. Process. Cham, Switzerland: Springer, 2018, pp. 253–264.

    [5] X.Liao,J.Yin,S.Guo,X.Li,andA.K.Sangaiah,‗‗MedicalJPEGimage steganography based on preserving interblock dependencies,‘‘ Comput. Electr. Eng., vol. 67, pp. 320–329, Apr. 2018.

    [6] Zebari, D., Haron, H., & Zeebaree, S. (2017). Security issues in DNA based on data Hiding: A review. International Journal of Applied Engineering Research, 12(24), 0973-4562.

    [7] Shtayt, B. A., Zakaria, N. H., & Harun, N. H. (2021). A comprehensive review on medical image steganography based on LSB technique and potential challenges. Baghdad Sci. J, 18, 957-974.

    [8] Devi S, Sahoo MN, Muhammad K, Ding W, Bakshi S. Hiding medical information in brain MR images without affecting accuracy of classifying pathological brain. Future Generation Computer Systems. 2019;99, 235-246.

    [9] Zeebaree, D. Q., Abdulazeez, A. M., Hassan, O. M. S., Zebari, D. A., & Saeed, J. N. (2020). Hiding Image by Using Contourlet Transform. Test Engineering and Management, 83, 16979-16990.

    [10] Abduallah, W. M., & Rahma, A. M. S. (2016). A review on steganography techniques. American Academic Scientific Research Journal for Engineering, Technology, and Sciences, 24(1), 131-150.

    [11] Goel, S., Rana, A., & Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology.

    [12] S. E. Tsai, and S.M. Yang, A Fast DCT Algorithm for Watermarking in Digital Signal Processor, Mathematical Problems in Engineering, Vol. 2017, 1-7. https://doi.org/10.1155/2017/7401845

    [13] Hamza YA. Highly Secure Image Steganography Approach Using Arnold‘s Cat Map and Maximum Image Entropy. Proceedings of the International Conference on Information and Communication Technology ICICT'19, Baghdad, Iraq, ACM. 2019:134-138.

    [14] A. Singh and H. Singh, ‗‗An improved LSB based image steganography technique for RGB images,‘‘ in Proc. IEEE Int. Conf. Electr., Comput. Commun. Technol. (ICECCT), Mar. 2015, pp. 1–4

    [15] Elharrouss, Omar, Noor Almaadeed, and Somaya Al-Maadeed. "An image steganography approach based on k-least significant bits (k- LSB)." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.

    [16] Mostaghim M, Boostani R. CVC:Chaotic visual cryptography to enhance steganography. 11th International ISC Conference on Information Security and Cryptology (ISCISC), Tehran, Iran. IEEE. 2014: 44-48

    [17] Hussain, Mehdi, et al. "A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement." Signal Processing: Image Communication 50 (2017): 44-57.

    [18] N. Raftari, & A. M. E. Moghadam. ―Digital Image Steganography Based on Integer Wavelet Transform and Assignment Algorithm‖. In Proc. of the International Conference of the Modelling Symposium (AMS), IEEE,2012, pp. 87-92.

    [19] V. Sachnev, and H. J. Kim. ―An improved matrix encoding scheme for JPEG steganography‖. In International Workshop on Digital Watermarking, Springer, vol. 7128 ,2012, pp. 3-15

    [20] Khalil MI. Medical image steganography: study of medical image quality degradation when embedding data in the frequency domain. International Journal of Computer Network and Information Security. 2017;9(2), 22.

    [21] Banjan N, Dalvi P. Medical Data Security using combination of Cryptography and Steganography with AES-LSB algorithm. 2018;7(7), 31–45.

    [22] Babatunde AO, Taiwo AJ, Dada EG. Information Security in Health Care Centre Using Cryptography and Steganography. 2018. arXiv preprint arXiv:1803.05593.

    [23] A. A. Abdulla, H. Sellahewa, and S. A. Jassim, ―Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images,‖ Multimed. Tools Appl., vol. 78, no. 13, pp. 17799- 17823, Jul. 2019.

    [24] B. Santoso, ―Color-based microscopic image steganography for telemedicine applications using pixel value differencing algorithm,‖ J. Phys. Conf. Ser., vol. 1175, paper. 012057, Mar. 2019.

    [25] S. Prasad and A. K. Pal, ―Logistic Map-Based Image Steganography Scheme Using Combined LSB and PVD for Security Enhancement,‖ Springer Singapore, vol. 755, pp. 203-214, 2019.

    [26] M. Y. Valandar, M. J. Barani, P. Ayubi, and M. Aghazadeh, ―An integer wavelet transform image steganography method based on 3D sine chaotic map,‖ Multimed. Tools Appl., vol. 78, no. 8, pp. 9971-9989, Apr. 2019.

    [27] A. Nevriyanto, S. Sutarno, S. D. Siswanti, and E. Erwin, ―Image Steganography Using Combine of Discrete Wavelet Transform and Singular Value Decomposition for More Robustness and Higher Peak Signal Noise Ratio,‖ Proc. 2018 Int. Conf. Electr. Eng. Comput. Sci. ICECOS 2018, vol. 17, pp. 147-152, 2019.

    [28] M. K. Shyla and K. B. Shiva Kumar, ―Novel Color Image Data Hiding Technique Based on DCT and Compressed Sensing Algorithm,‖ Springer Singapore, vol. 545, pp. 1151-1157, 2019.

    Cite This Article As :
    Y., Amar. Image Steganography Based Spatial and Transform Domain Techniques: A Review. Fusion: Practice and Applications, vol. , no. , 2022, pp. 08-15. DOI: https://doi.org/10.54216/FPA.080101
    Y., A. (2022). Image Steganography Based Spatial and Transform Domain Techniques: A Review. Fusion: Practice and Applications, (), 08-15. DOI: https://doi.org/10.54216/FPA.080101
    Y., Amar. Image Steganography Based Spatial and Transform Domain Techniques: A Review. Fusion: Practice and Applications , no. (2022): 08-15. DOI: https://doi.org/10.54216/FPA.080101
    Y., A. (2022) . Image Steganography Based Spatial and Transform Domain Techniques: A Review. Fusion: Practice and Applications , () , 08-15 . DOI: https://doi.org/10.54216/FPA.080101
    Y. A. [2022]. Image Steganography Based Spatial and Transform Domain Techniques: A Review. Fusion: Practice and Applications. (): 08-15. DOI: https://doi.org/10.54216/FPA.080101
    Y., A. "Image Steganography Based Spatial and Transform Domain Techniques: A Review," Fusion: Practice and Applications, vol. , no. , pp. 08-15, 2022. DOI: https://doi.org/10.54216/FPA.080101