Preview

Informatics

Advanced search

COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

Abstract

Steganography is a method of hiding information in other information of different format (container). There are many steganography techniques with various types of container. In the Internet, digital images are the most popular and frequently used containers. We consider main image steganography techniques and their advantages and disadvantages. We also identify the requirements of a good steganography algorithm and compare various such algorithms.

About the Authors

S. A. Seyyedi
Белорусский государственный университет информатики и радиоэлектроники
Russian Federation


R. Kh. Sadykhov
Белорусский государственный университет информатики и радиоэлектроники
Russian Federation


References

1. Currie, D.L. Surmounting the effects of lossy compression on Steganography / D.L. Currie,C.E. Irvine // 19th National Information Systems Security Conference. – Baltimore, 1996.

2. Ahsan, K. Practical Data hiding in TCP/IP / K. Ahsan, D. Kundur // Proceedings of the Workshop on Multimedia Security at ACM Multimedia. – Canada, 2002.

3. Johnson, N.F. Exploring Steganography: Seeing the Unseen / N.F. Johnson, S. Jajodia // Computer Journal. – 1998. – Vol. 31, № 2. – P. 26–34.

4. Katzenbeisser, S. Information Hiding Techniques for Steganography and Digital Watermarking / S. Katzenbeisser, F.A.P. Petitcolas. – Norwood, MA : Artech House, 2000.

5. Niimi, M. High Capacity and Secure Digital Steganography to Palette-Based Images / M. Niimi // IEEE International conference on image processing. – Japan, 2002. – Vol. 2. – P. 917–920.

6. Al-Sadoon, B. On the Development of Steganographic Tools / B. Al-Sadoon, H. Mathkour, Gh. Assassa // Proceedings of the 1st National Information Technology Symposium, NITS. – Riyadh, Saudi Arabia, 2006.

7. Morkel, T. An Overview of Image Steganography / T. Morkel, J.H.P. Eloff, M.S. Olivier. – South Africa : University of Pretoria, 2002.

8. Bender W. Techniques for data hiding / W. Bender, D.Gruhl // IBM Systems Journal. – 1996. – Vol. 35, № 3–4.

9. Krenn, R. Steganography and steganalysis, Internet Publication, March 2004 [Electronic resource] / R. Krenn. – Mode of access : http://www.krenn.nl/univ/cry/steg/article.pdf. – Date of access : 24.12.2012.

10. Steganography Software [Electronic resource]. – Mode of access : http://www.jjtc.com/Steganography/tools.html. – Date of access : 23.12.2012.

11. Brundick, F. Implementation of Spread Spectrum Image Steganography / F. Brundick, L. Marvel [Electronic resource]. – 2001. – Mode of access : http://permanent.access.gpo.gov/gpo2618/ARL-TR-2433.pdf. – Date of access : 24.12.2012.

12. Chang, C.C. Introduction to the Visual Cryptography / C.C. Chang, L.Z. Chuang // Communication of the Chinese Cryptology and Information Security Association (CCISA). – 2004. – Vol. 10, № 2. – P. 1–14.

13. Meenu Kumari, A. JPEG Compression Steganography & Crypography Using Image-Adaptation Technique / A. Meenu Kumari, P. Khare // Journal of Advances in Information Technology.– 2010. – Vol. 1, № 3.

14. Bushra Kassim Al-Abudi. Colour Image Data Compression Using Multilevel Block Trunsaction Coding Technique / Bushra Kassim Al-Abudi // Phd Thesis. – Baghdad : College of Science,2002.

15. Sua’d Kakil, A. Image in Image Hiding System using Iterated Function System (IFS) /A. Sua’d Kakil // Msc Thises. – Iraq : University of Sulaimani, 2009.

16. Khosravi, S. A new steganography method based HIOP (Higher Intensity Of Pixel) algorithm and Strassen's matrix multiplication / S. Khosravi, M.A. Dezfoli, M.H. Yektaie // Journal of Global Research in Computer Science. – 2011. – Vol. 2, № 1.

17. Mathkour, H. A New Image Steganography Technique / H. Mathkour, B. Al-Sadoon, A. Touir // Wireless Communications, Networking and Mobile Computing (WiCOM) : 4th International Conference on IEEE. – Dalian, China, 2008. – P. 1–4.

18. Babu, S. Authentication of Secret Information in Image Steganography / S. Babu, K.B. Raja // IEEE. – India : University of Heydarabad, 2008. – P. 1–6.


Review

For citations:


Seyyedi S.A., Sadykhov R.Kh. COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS. Informatics. 2013;(1):66-75. (In Russ.)

Views: 1796


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1816-0301 (Print)
ISSN 2617-6963 (Online)