Review: Digital image steganography: Survey and analysis of current methods

作者: Abbas Cheddad , Joan Condell , Kevin Curran , Paul Mc Kevitt

DOI: 10.1016/J.SIGPRO.2009.08.010

关键词: Computer securityCryptographyComputer scienceImage processingSteganography toolsSteganalysisDigital watermarkingSteganographyDigital image

摘要: Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under assumption if feature visible, point of attack evident, thus goal here always to conceal very existence embedded data. has various useful applications. However, like any other it can be used for ill intentions. been propelled forefront current security techniques by remarkable growth computational power, increase awareness by, individuals, groups, agencies, government through intellectual pursuit. Steganography's ultimate objectives, which are undetectability, robustness (resistance image processing methods compression) capacity hidden data, main factors separate from related such as watermarking cryptography. This paper provides a state-of-the-art review analysis different existing steganography along with some common standards guidelines drawn literature. concludes recommendations advocates object-oriented embedding mechanism. Steganalysis, attacking steganography, not focus this survey but nonetheless will briefly discussed.

参考文章(126)
Lei Zheng, Ingemar J. Cox, JPEG Based Conditional Entropy Coding for Correlated Steganography Multimedia and Expo, 2007 IEEE International Conference on. pp. 1251- 1254 ,(2007) , 10.1109/ICME.2007.4284884
Jessica Fridrich, Miroslav Goljan, Practical steganalysis of digital images: state of the art electronic imaging. ,vol. 4675, pp. 1- 13 ,(2002) , 10.1117/12.465263
Lifang Yu, Yao Zhao, Rongrong Ni, Zhenfeng Zhu, PM1 steganography in JPEG images using genetic algorithm soft computing. ,vol. 13, pp. 393- 400 ,(2008) , 10.1007/S00500-008-0327-7
Kevin Curran, Xuelong Xi, Roisin Clarke, An Investigation into the Use of the Least Significant Bit Substitution Technique in Digital Watermarking American Journal of Applied Sciences. ,vol. 2, pp. 648- 654 ,(2005) , 10.3844/AJASSP.2005.648.654
Giacomo Cancelli, Gwenael Doerr, Mauro Barni, Ingemar J. Cox, A comparative study of ± steganalyzers multimedia signal processing. pp. 791- 796 ,(2008) , 10.1109/MMSP.2008.4665182
Chin-Chen Chang, Hsien-Wen Tseng, A steganographic method for digital images using side match Pattern Recognition Letters. ,vol. 25, pp. 1431- 1437 ,(2004) , 10.1016/J.PATREC.2004.05.006
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, A skin tone detection algorithm for an adaptive approach to steganography Signal Processing. ,vol. 89, pp. 2465- 2478 ,(2009) , 10.1016/J.SIGPRO.2009.04.022
X LI, J WANG, A steganographic method based upon JPEG and particle swarm optimization algorithm Information Sciences. ,vol. 177, pp. 3099- 3109 ,(2007) , 10.1016/J.INS.2007.02.008
Cheng Deng, Xinbo Gao, Xuelong Li, Dacheng Tao, A local Tchebichef moments-based robust image watermarking Signal Processing. ,vol. 89, pp. 1531- 1539 ,(2009) , 10.1016/J.SIGPRO.2009.02.005