732 672
Full Length Article
Fusion: Practice and Applications
Volume 8 , Issue 1, PP: 08-15 , 2022 | Cite this article as | XML | Html |PDF

Title

Image Steganography Based Spatial and Transform Domain Techniques: A Review

  Amar Y. Hussien 1 *

1  Researcher, Department of Statistics, Duhok, Iraq
    (amar.yehya85@gmail.com)


Doi   :   https://doi.org/10.54216/FPA.080101

Received: April 13, 2022 Accepted: July 22, 2022

Abstract :

The amount of data shared online today is increasing. Data security is therefore cited as a significant problem while processing data exchanges through the Internet. Everyone needs the security of their data during communication processes. The science and art of steganography is the concealment of one audio, message, video, or image by embedding another audio, message, video, or image in its place. It is employed to protect sensitive data against malicious assaults. In order to detect the numerous methods employed with digital steganography, this study seeks to identify the primary image-based mediums. As a result, in the spatial domain of the digital medium, the LSB approach was mostly employed, whereas in the transform domain, DTC and DWT were separated as the primary techniques. Due to its simplicity and large embedding capacity, the spatial domain was the most frequently used domain in digital steganography.

Keywords :

Information Security; Image Steganography; Spatial Domain; Transform Domain.

References :

[1] Beroual, Abdesselam, and Imad Fakhri Al- Shaikhli. "A Review of Steganographic Methods and

Techniques." International Journal on Perceptive and Cognitive Computing 4.1 (2018): 1-6.

[2] Zebari, N. A., Zebari, D. A., Zeebaree, D. Q., & Saeed, J. N. (2021). Significant features for steganography

techniques using deoxyribonucleic acid: a review. Indonesian Journal of Electrical Engineering and Computer

Science, 21(1), 338-347.

[3] I. J. Kadhim, P. Premaratne, P. J. Vial and B. Halloran. (2019). ―Comprehensive survey of image

steganography: Techniques, evaluations, and trends in future research,‖ Neurocomputing, vol. 335, pp. 299–326.

[4] Z. Wang, N. Gao, X. Wang, X. Qu, and L. Li, ‗‗SSteGAN: Self- learning steganography based on generative

adversarial networks,‘‘ in Proc. Int. Conf. Neural Inf. Process. Cham, Switzerland: Springer, 2018, pp. 253–264.

[5] X.Liao,J.Yin,S.Guo,X.Li,andA.K.Sangaiah,‗‗MedicalJPEGimage steganography based on preserving interblock

dependencies,‘‘ Comput. Electr. Eng., vol. 67, pp. 320–329, Apr. 2018.

[6] Zebari, D., Haron, H., & Zeebaree, S. (2017). Security issues in DNA based on data Hiding: A

review. International Journal of Applied Engineering Research, 12(24), 0973-4562.

[7] Shtayt, B. A., Zakaria, N. H., & Harun, N. H. (2021). A comprehensive review on medical image

steganography based on LSB technique and potential challenges. Baghdad Sci. J, 18, 957-974.

[8] Devi S, Sahoo MN, Muhammad K, Ding W, Bakshi S. Hiding medical information in brain MR

images without affecting accuracy of classifying pathological brain. Future Generation Computer

Systems. 2019;99, 235-246.

[9] Zeebaree, D. Q., Abdulazeez, A. M., Hassan, O. M. S., Zebari, D. A., & Saeed, J. N. (2020). Hiding Image

by Using Contourlet Transform. Test Engineering and Management, 83, 16979-16990.

[10] Abduallah, W. M., & Rahma, A. M. S. (2016). A review on steganography techniques. American Academic

Scientific Research Journal for Engineering, Technology, and Sciences, 24(1), 131-150.

[11] Goel, S., Rana, A., & Kaur, M. (2013). A review of comparison techniques of image steganography. Global

Journal of Computer Science and Technology.

[12] S. E. Tsai, and S.M. Yang, A Fast DCT Algorithm for Watermarking in Digital Signal Processor,

Mathematical Problems in Engineering, Vol. 2017, 1-7. https://doi.org/10.1155/2017/7401845

[13] Hamza YA. Highly Secure Image Steganography Approach Using Arnold‘s Cat Map and

Maximum Image Entropy. Proceedings of the International Conference on Information and

Communication Technology ICICT'19, Baghdad, Iraq, ACM. 2019:134-138.

[14] A. Singh and H. Singh, ‗‗An improved LSB based image steganography technique for RGB images,‘‘ in

Proc. IEEE Int. Conf. Electr., Comput. Commun. Technol. (ICECCT), Mar. 2015, pp. 1–4

[15] Elharrouss, Omar, Noor Almaadeed, and Somaya Al-Maadeed. "An image steganography approach based

on k-least significant bits (k- LSB)." 2020 IEEE International Conference on Informatics, IoT, and Enabling

Technologies (ICIoT). IEEE, 2020.

[16] Mostaghim M, Boostani R. CVC:Chaotic visual cryptography to enhance steganography. 11th

International ISC Conference on Information Security and Cryptology (ISCISC), Tehran, Iran. IEEE. 2014:

44-48

[17] Hussain, Mehdi, et al. "A data hiding scheme using parity-bit pixel value differencing and improved

rightmost digit replacement." Signal Processing: Image Communication 50 (2017): 44-57.

[18] N. Raftari, & A. M. E. Moghadam. ―Digital Image Steganography Based on Integer Wavelet

Transform and Assignment Algorithm‖. In Proc. of the International Conference of the Modelling

Symposium (AMS), IEEE,2012, pp. 87-92.

[19] V. Sachnev, and H. J. Kim. ―An improved matrix encoding scheme for JPEG steganography‖. In

International Workshop on Digital Watermarking, Springer, vol. 7128 ,2012, pp. 3-15

[20] Khalil MI. Medical image steganography: study of medical image quality degradation when embedding data

in the frequency domain. International Journal of Computer Network and Information Security. 2017;9(2), 22.

[21] Banjan N, Dalvi P. Medical Data Security using combination of Cryptography and Steganography with

AES-LSB algorithm. 2018;7(7), 31–45.

[22] Babatunde AO, Taiwo AJ, Dada EG. Information Security in Health Care Centre Using Cryptography and

Steganography. 2018. arXiv preprint arXiv:1803.05593.

[23] A. A. Abdulla, H. Sellahewa, and S. A. Jassim, ―Improving embedding efficiency for digital steganography

by exploiting similarities between secret and cover images,‖ Multimed. Tools Appl., vol. 78, no. 13, pp. 17799-

17823, Jul. 2019.

[24] B. Santoso, ―Color-based microscopic image steganography for telemedicine applications using pixel value

differencing algorithm,‖ J. Phys. Conf. Ser., vol. 1175, paper. 012057, Mar. 2019.

[25] S. Prasad and A. K. Pal, ―Logistic Map-Based Image Steganography Scheme Using Combined LSB and

PVD for Security Enhancement,‖ Springer Singapore, vol. 755, pp. 203-214, 2019.

[26] M. Y. Valandar, M. J. Barani, P. Ayubi, and M. Aghazadeh, ―An integer wavelet transform image

steganography method based on 3D sine chaotic map,‖ Multimed. Tools Appl., vol. 78, no. 8, pp. 9971-9989,

Apr. 2019.

[27] A. Nevriyanto, S. Sutarno, S. D. Siswanti, and E. Erwin, ―Image Steganography Using Combine of

Discrete Wavelet Transform and Singular Value Decomposition for More Robustness and Higher Peak Signal

Noise Ratio,‖ Proc. 2018 Int. Conf. Electr. Eng. Comput. Sci. ICECOS 2018, vol. 17, pp. 147-152, 2019.

[28] M. K. Shyla and K. B. Shiva Kumar, ―Novel Color Image Data Hiding Technique Based on DCT and

Compressed Sensing Algorithm,‖ Springer Singapore, vol. 545, pp. 1151-1157, 2019.


Cite this Article as :
Style #
MLA Amar Y. Hussien. "Image Steganography Based Spatial and Transform Domain Techniques: A Review." Fusion: Practice and Applications, Vol. 8, No. 1, 2022 ,PP. 08-15 (Doi   :  https://doi.org/10.54216/FPA.080101)
APA Amar Y. Hussien. (2022). Image Steganography Based Spatial and Transform Domain Techniques: A Review. Journal of Fusion: Practice and Applications, 8 ( 1 ), 08-15 (Doi   :  https://doi.org/10.54216/FPA.080101)
Chicago Amar Y. Hussien. "Image Steganography Based Spatial and Transform Domain Techniques: A Review." Journal of Fusion: Practice and Applications, 8 no. 1 (2022): 08-15 (Doi   :  https://doi.org/10.54216/FPA.080101)
Harvard Amar Y. Hussien. (2022). Image Steganography Based Spatial and Transform Domain Techniques: A Review. Journal of Fusion: Practice and Applications, 8 ( 1 ), 08-15 (Doi   :  https://doi.org/10.54216/FPA.080101)
Vancouver Amar Y. Hussien. Image Steganography Based Spatial and Transform Domain Techniques: A Review. Journal of Fusion: Practice and Applications, (2022); 8 ( 1 ): 08-15 (Doi   :  https://doi.org/10.54216/FPA.080101)
IEEE Amar Y. Hussien, Image Steganography Based Spatial and Transform Domain Techniques: A Review, Journal of Fusion: Practice and Applications, Vol. 8 , No. 1 , (2022) : 08-15 (Doi   :  https://doi.org/10.54216/FPA.080101)