Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

International Journal of Advanced Engineering Research and Technology (IJAERT)

Volume 2 Issue 8, November 2014, ISSN No.: 2348 8190

322

REVIEW IMAGE STEGANOGRAPHY


Yojna Goyal
Student
Department of Computer Science &. Engg.
LPU, Jalandhar(Pb)-India

Manmohan Sharma
Assistant Professor
Department of Computer Science &. Engg
LPU, Jalandhar (Pb)-India

ABSTRACT
This Paper provides a review on the steganography,
Image Steganography. Steganography is able to hide the
top secret information into the object, object can be
considered as text, image, audio, and video.
Steganography is used for protection of the
communicating messages transmitted over the network
between two persons. For the image steganography we
can obtain the success by inserting the content into the
cover information. In this paper we analysis the features,
application, image steganography with related work.
Keywords Steganography,
Image Steganography, Encryption

I.

2. Perceptual Transparency: Hiding the information


in the wrapper consequence some replacements in
the wrapper image for example Noise inflection or
deformation. It is most essential that the implanting
of information happens without major loss of
perceptual quality and degradation. If there is little
deformation in the image noticed by the invader
and the steganographic encoding fails although the
invader is not capable to get the information.
3.

Robustness: Robustness signifies to the talent of


implanting the information to wait integral if the
stego-image goes through a few conversions.

4.

Tamper Resistance: Tamper-resistance signifies


to the complexity for an invader to rework on the
significance once it has been implanted in a stegoimage. For maintaining integrity of the image we
requires, more complexity for an invader means a
smaller amount modification in stego image.

Cryptography,

INTRODUCTION

Over the past years, we see the rapid increase in the use
of internet for transmitting the information to another
person without unauthorized access. This can be attained
by steganography only. We can embed the covert
information to the cover information. Steganography
found by two different words stego and grafia which
means covered writing.
The similarity between steganography and cryptography
is, together they are used to cover up important
Information. But the difference is that the steganography
does not reveal any suspicious about the hidden secret
message to the customer. Therefore the assailant will not
struggle to decrypt secret information. This Paper
reviews the various methods of steganography such as
image, audio, video, text, to mask the Information.
Cryptography deals message encryption but the
communication is visible.
Various features characterize the strengths and
weaknesses of the methods.
1. Hiding Capacity: Hiding capacity is the amount of
messages that can be invisible virtualized to the
amount of the wrapper message. A well-built hiding
capacity permits the utilization of a smaller wrapper
for the message of permanent amount ensuing in
diminishing of the bandwidth necessary to
broadcast the stego-image.

II.

APPLICATIONS
STEGANOGRAPHY

OF

In todays world steganography is used for a lot of


useful applications:
Smart identity cards where the details of
individuals are embedded in their photographs.
Used for Video-audio synchronization
Used in TV broadcasting
Used in Media Database systems so audio, video
can transform.
Used in defence organisations for information
exchange without knowing of third party

III.

IMAGE STEGANOGRAPHY

Image Steganography is encoding surreptitious messages


in Images. Surreptitious message can be any plaintext,
image, ciphertext, and any other medium. An image
contains number of pixels. Pixel is representation of
light intensities at various points which are considered as
controllable element of the image. Figure shows the
Steganographic Model. Secret information S is hidden

www.ijaert.org

International Journal of Advanced Engineering Research and Technology (IJAERT)


Volume 2 Issue 8, November 2014, ISSN No.: 2348 8190

inside the cover image O by steganographic algorithm


which gives a stego image S. This Stego image S is
spreader over the channel and received at the receiver
end.

Cover image
O

Secret
message S

Embed the secret message


into cover image

Obtain Stego
information
Figure1: Steganographic Model
For extracting the information at the receiver side we
will follow the reverse process for the system foe
embedding the information. Again by using the
steganographic algorithm secret message S is extracted.

IV.

and hide its presence. Hackers use Steganalysis


technology which beat Steganography by identifying the
hidden message and extracting. A novel and robust
image steganography technique which insert information
into the another information and cover its presence and
also confirm the trust ability of data transferred to the
receiver. To hide original data in another image
component based approach and technique of Palette
Based Images are used. The bits of transfred information
are present into the expanded palette of image without
knowledge of others.
RigDas, Themrichon Tuithung (2012) describes that
paper has taken two different 8 bit gray level pictures,
cover picture of size M X N and secret image of P X Q.
Huffman Encoding is executed into the hidden image
and implants every bit of Huffman code of hidden image
introduced into the wrapper image by modifying its least
significant bit of every pixels intensities of wrapper
image. Size of bit stream and Huffman table are
implanted into wrapper image, by which Stego image
can be individual information for the receiver. This
technique has large capacity with fine invisibility and
PSNR (Peak Signal to Noise Ratio) of stego image had
shown better results with wrapper class. Quality is also
improved and suitable safety is maintained as the hidden
image could not taken out without knowing of
knowledge of the decoding policy and Huffman tables.
Size of secret image lies only inside the stego image and
decoder should be known to the Extraction algorithm to
pull out the hidden image.

RELATED WORK

V.

Smitha Suresh, Dr.KChitra, Deepak.P (2013) describes a


video observation system is popular to ensure security in
major areas. Current video observation system analyzes
the tracking of multiple human in the video. The
difficulty of detecting moving targets in crowded scenes
is one of the most challenges in this system. Occlusion is
defined as an object which hides another object by
multiple human tracking in a one/series of frames.
Occlusion detection and handling is an important and
main objective of the planned work is to detect
occlusion. In this, patches in each object are used to
identify the parts which are going to be occluded. The
system can find the occlusion between humans in a
scene and can recognize the occluded parts of every
object. Goal is to develop a observation system that is
free from occlusion. Occlusion is verified by calculating
the distance between the centres of mass of both objects
and if the difference in a frame is zero, and then object is
occlusion.
Amit Asthana(2012) describes that Steganography and
Steganalysis are two essential section of research from
which trustworthy and secure data is exchanged.
Steganography introduce a message into a cover media

323

CONCLUSION
WORK

AND

FUTURE

By these papers we conclude that a lot of work is done


by using steganography. We see that mostly LSB of
spatial domain is used frequently. This paper provides an
overview of different steganography methods that satisfy
the most important factors of steganography design.
These are undetect ability, capacity and robustness.

REFERENCES
[1] Jasleen Kour, Deepankar Verma, Steganography
Techniques A Review Paper, International Journal of
Emerging Research in Management &Technology ISSN:
2278-9359 (Volume-3, Issue-5)
[2] Rakhi1, Suresh Gawande, A REVIEW ON
STEGANOGRAPHY
METHODS,
International
Journal of Advanced Research in Electrical, Electronics
and Instrumentation Engineering (An ISO 3297: 2007
Certified Organization) Vol. 2, Issue 10, October 2013
[3] Shilpa Thakar, Monika Aggarwal, A Review
Steganography, International Journal of Advanced

www.ijaert.org

International Journal of Advanced Engineering Research and Technology (IJAERT)


Volume 2 Issue 8, November 2014, ISSN No.: 2348 8190

Research in Computer Science and software


Engineering, Volume 3, Issue 12, December 2013
[4] R.Poornima, R.J.Iswarya, AN OVERVIEW OF
DIGITAL IMAGE STEGANOGRAPHY, International
Journal of Computer Science & Engineering Survey
(IJCSES) Vol.4, No.1, February 2013

324

[14] Jawad Ahmad and Fawad Ahmed, Efficiency


Analysis and Security Evaluation of Image Encryption
Schemes, International Journal of Video & Image
Processing and Network Security, Vol. 12, No. 04, 2012

[5] Jaspal Kaur Saini, Harsh K Verma, A Hybrid


Approach for Image Security by Combining Encryption
and Steganography, Proceedings of the 2013 IEEE
Second International Conference on Image Information
Processing (ICIIP-2013)
[6] Smitha Suresh, Dr.KChitra, Deepak.P Pateh Based
Frame Work for Occlusion Deteetion in Multi Human
Tracking , 2013 International Conference on Circuits,
Power and Computing Technologies [ICCPCT-2013]
[7] RigDas, Themrichon Tuithung A Novel
Steganography Method for Image Based on Huffman
Encoding , 2012 IEEE
[8] Amit Asthana, Sherish Johri, An Adaptive
Steganography Technique for Gray and Colored Images
May 2012 International Journal of Advanced Research
in Computer Science and Software Engineering
[9] Alan Kaminsky, Michael Kurdziel, Stanisaw
Radziszowski, An Overview of Cryptanalysis Research
for the Advanced Encryption Standard
[10] Saroj Kumar Panigrahy, Bibhudendra Acharya and
Debasish Jen, Image Encryption Using Self-Invertible
Key Matrix of Hill Cipher Algorithm, 1st t
International Conference on Advances in Computing,
Chikhli, India, 21-22 February 2008
[11] Komal D Patel, Sonal Belani, Image Encryption
Using Different Techniques: A Review International
Journal of Emerging Technology and Advanced
Engineering, November 2011
[12] C.K. Huang, C.W. Liao, S.L. Hsu, Y.C. Jeng,
Implementation of gray image encryption with pixel
shuffling and gray-level encryption by single chaotic
system, Telecommunication Systems, Vol. 52, pp 563571. 29, February, 2013.
[13] Gyan Singh Yadav and Aparajita Ojha,A Fast and
Efficient Data Hiding Scheme in Binary Images, Eighth
International Conference on Intelligent Information
Hiding and Multimedia Signal Processing, p. 79 84,
2012.

www.ijaert.org

You might also like