A literature Survey of Image Steganographic Techniques


Authors : Soumen Bhowmik; Pushpa Tiwari

Volume/Issue : Volume 10 - 2025, Issue 5 - May


Google Scholar : https://tinyurl.com/2tpcp7va

DOI : https://doi.org/10.38124/ijisrt/25may1586

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Image steganography is a highly effective technique for secure communication, allowing data to be concealed within digital images.This paper provides a comparative analysis of various methods proposed by some papers presented, to enhance the efficiency of image steganographic techniques, with a focus on optimizing data capacity and imperceptibility. It has been observed that significant improvements in the quality metrics of stego images and their robustness against attacks can greatly contribute to achieving the objective of secure data hiding. These findings highlight the potential of the proposed approach to advance secure data transmission.

Keywords : Steganography, Payload, Discrete Cosine Transform, Singular Value Decomposition, Least Significant Bit.

References :

  1. Dasgupta, K., Mandal, J.K. and Dutta, P., 2012. Hash based least significant bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2), pp.1-11.
  2. Singh, Siddharth, and Tanveer J. Siddiqui. "Transform domain techniques for image steganography." Computer Vision: Concepts, Methodologies, Tools, and Applications. IGI Global, 2018. 170-186.
  3. Bhowmik, S., Ghosh, A. and Bhaumik, A. K., 2016. High Level of Perceptibility and Security in Color Image Steganography, IJSETR, Vol-5, Issue-2, pp.596-599.
  4. Chan, C.K. and Cheng, L.M., 2004. Hiding data in images by simple LSB substitution. Pattern recognition, 37(3), pp.469-474
  5. Pandey, F., Gupta, S. and Kumar, S., 2014. Information hiding using image steganography-A survey. Journal of Basic and Applied Engineering Research (JBAER), 14, p.854.
  6. Mstafa, R. and Bach, C., 2013, March. Information hiding in images using steganography techniques. In ASEE Northeast Section Conference Norwich University, Reviewed Paper.
  7. Mustafa, A.E., ElGamal, A.M.F., ElAlmi, M.E. and Bd, A., 2011. A proposed algorithm for steganography in digital image based on least significant bit. Research Journal Specific Education Faculty of Specific Education, Mansoura University, 21.
  8. Hussain, M. and Hussain, M., 2010, June. Pixel intensity based high capacity data embedding method. In 2010 International Conference on Information and Emerging Technologies (pp. 1-5). IEEE.
  9. Hemalatha, S., Acharya, U.D. and Renuka, A., 2013. Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains. arXiv preprint arXiv:1307.3026.
  10. Juneja, M. and Sandhu, P.S., 2013. An improved LSB based steganography technique for RGB color images. International journal of computer and communication engineering, 2(4), p.513.
  11. Halder, R., Sengupta, S., Ghosh, S. and Kundu, D., 2016. A secure image steganography based on rsa algorithm and hash-lsb technique. IOSR Journal of Computer Engineering (IOSR-JCE), 18(1), pp.39-43.
  12. Vaishali, P. and Bhat, P., 2015. Transform domain techniques for image steganography. International Journal Of Innovative Research In Electrical, Electronics, Instrumentation And Control Engineering, 3(1), pp.65-68.
  13. http://hdl.handle.net/10603/240087
  14. Singh, S. and Siddiqui, T.J., 2018. Transform domain techniques for image steganography. In Computer Vision: Concepts, Methodologies, Tools, and Applications (pp. 170-186). IGI Global.

Image steganography is a highly effective technique for secure communication, allowing data to be concealed within digital images.This paper provides a comparative analysis of various methods proposed by some papers presented, to enhance the efficiency of image steganographic techniques, with a focus on optimizing data capacity and imperceptibility. It has been observed that significant improvements in the quality metrics of stego images and their robustness against attacks can greatly contribute to achieving the objective of secure data hiding. These findings highlight the potential of the proposed approach to advance secure data transmission.

Keywords : Steganography, Payload, Discrete Cosine Transform, Singular Value Decomposition, Least Significant Bit.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe