Image Steganography

Author(s):  
Sana Parveen K ◽  
Renjith V. Ravi ◽  
Basma Abd El-Rahiem ◽  
Mangesh M. Ghonge

Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties. As data is unknown, it is challenging to attract the attention of any third parties. Therefore, steganography becomes the best and most secure method for data transmission. Digital images are the most common cover media or carriers in steganographic processes, where the secret payload is embedded into images. Several techniques are coming under image steganography, and there includes a different method to ensure the secrecy of messages. This chapter gives an overview of the different commonly used techniques in this area and the latest existing image steganography methods and the comparison of techniques.

Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


Author(s):  
Meera Tamboli

Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.


Author(s):  
Sakshi Meshram ◽  
Pragati Nimje ◽  
Apeksha Dhengre ◽  
Tanvi Bingewar ◽  
Gauri Shende ◽  
...  

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project intends to give an overview of image steganography, its uses and techniques. It also supports steganography in Audio files. For a more secure approach, the project encrypts the message using secret key and then sends it to the receiver. The receiver then decrypts the message to get the original one.


This chapter introduces the reader to cryptography, steganography, watermarking, and quality parameters of image steganography techniques. Cryptography is a technique for secret communication. Steganography is a technique for secret and unnoticeable communication. The watermarking techniques hide watermarks inside the digital media. There are four types of steganography techniques: (1) image steganography, (2) audio steganography, (3) video steganography, and (4) text steganography. The quality of image steganographic algorithms can be measured by three parameters like (1) hiding capacity, (2) distortion measure, and (3) security check.


2018 ◽  
Vol 7 (3) ◽  
pp. 1024 ◽  
Author(s):  
Indu Maurya ◽  
S K Gupta

For hiding information in a digitalized object Steganography is an important technique. It is a special kind of scientific technique which involves the secret information communication inside suitable cover objects of multimedia like image files, audio or videos. The embedded data and its existence are hidden with the help of Steganography. It is a method of hiding data which has enormously improved the security level of confidential data with the help of special hiding mechanism and is considered as remarkable achievement in the computational power. The main aims of Steganography are; capacity of concealed data along with its robustness, lack of detection etc. These are some of the additional features which make it distinguishing from other older techniques like watermarking as well as cryptography. In this research paper, we have surveyed Steganography of digital images and cover the basic and key concepts. In spatial representation the development of image Steganographic methodology in the format of JPEG, along with that we will also debate on the modern developments as far as Steganography is concerned.For increasing Steganographic security, specifically used approaches are shortlisted and the developments made after investigations are also presented in this paper.  


2014 ◽  
Vol 496-500 ◽  
pp. 1986-1990
Author(s):  
Jia Min Zhou ◽  
Yang Pan ◽  
Ren Er Yang

In order to solve the security problem of the multimedia in the communication process, steganography plays a vital role. In this paper, the DCT domain of digital image steganography is to study the impact of image quality with different embedding positions, the secret information in the DCT domain of an image, different carrier images and the amount of information. Studies show that: embedding the information in the low frequency part of the image, selecting the image with the rich distribution pixel value, is conducive to improve the steganography effects of the information in the image, enhance the concealment of the secret information.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


2020 ◽  
Vol 4 (4) ◽  
pp. 745-750
Author(s):  
Yulius Harjoseputro ◽  
Albertus Ari Kristanto ◽  
Joseph Eric Samodra

A good application development requires a testing phase to ensure there are no errors before it’s released to public. But testing phase becomes difficult if the application development involves features from third parties. The idea to resolve the problem for Dhanapala application under the auspices of PT. Semangat Gotong Royong is to make the Sandbox system which is a system designed to resemble the characteristics of a third party. The Sandbox system will be developed into a REST API and written using the Golang programming language. In conducting communications with other systems New Simple Queue (NSQ) is also used that can support concurrency and prevent data transmission failures. As a result, the Sandbox system can receive requests and will process responses that are similar to functions from third parties. All forms of feature calls to third parties can be transferred to the Sandbox system so that all the data needs on some functions involving third parties can be fulfilled and the Dhanapala application can be run without its dependence on third parties  


Author(s):  
K. Suresh Babu ◽  
K. B. Raja ◽  
Kumar K. Kiran ◽  
T. H. Manjula Devi ◽  
K. R. Venugopal ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document