Authors :
Soumen Bhowmik; Pushpa Tiwari
Volume/Issue :
Volume 10 - 2025, Issue 5 - May
Google Scholar :
https://tinyurl.com/2tpcp7va
DOI :
https://doi.org/10.38124/ijisrt/25may1586
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Image steganography is a highly effective technique for secure communication, allowing data to be concealed
within digital images.This paper provides a comparative analysis of various methods proposed by some papers presented, to
enhance the efficiency of image steganographic techniques, with a focus on optimizing data capacity and imperceptibility.
It has been observed that significant improvements in the quality metrics of stego images and their robustness against
attacks can greatly contribute to achieving the objective of secure data hiding. These findings highlight the potential of the
proposed approach to advance secure data transmission.
Keywords :
Steganography, Payload, Discrete Cosine Transform, Singular Value Decomposition, Least Significant Bit.
References :
- Dasgupta, K., Mandal, J.K. and Dutta, P., 2012. Hash based least significant bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2), pp.1-11.
- Singh, Siddharth, and Tanveer J. Siddiqui. "Transform domain techniques for image steganography." Computer Vision: Concepts, Methodologies, Tools, and Applications. IGI Global, 2018. 170-186.
- Bhowmik, S., Ghosh, A. and Bhaumik, A. K., 2016. High Level of Perceptibility and Security in Color Image Steganography, IJSETR, Vol-5, Issue-2, pp.596-599.
- Chan, C.K. and Cheng, L.M., 2004. Hiding data in images by simple LSB substitution. Pattern recognition, 37(3), pp.469-474
- Pandey, F., Gupta, S. and Kumar, S., 2014. Information hiding using image steganography-A survey. Journal of Basic and Applied Engineering Research (JBAER), 14, p.854.
- Mstafa, R. and Bach, C., 2013, March. Information hiding in images using steganography techniques. In ASEE Northeast Section Conference Norwich University, Reviewed Paper.
- Mustafa, A.E., ElGamal, A.M.F., ElAlmi, M.E. and Bd, A., 2011. A proposed algorithm for steganography in digital image based on least significant bit. Research Journal Specific Education Faculty of Specific Education, Mansoura University, 21.
- Hussain, M. and Hussain, M., 2010, June. Pixel intensity based high capacity data embedding method. In 2010 International Conference on Information and Emerging Technologies (pp. 1-5). IEEE.
- Hemalatha, S., Acharya, U.D. and Renuka, A., 2013. Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains. arXiv preprint arXiv:1307.3026.
- Juneja, M. and Sandhu, P.S., 2013. An improved LSB based steganography technique for RGB color images. International journal of computer and communication engineering, 2(4), p.513.
- Halder, R., Sengupta, S., Ghosh, S. and Kundu, D., 2016. A secure image steganography based on rsa algorithm and hash-lsb technique. IOSR Journal of Computer Engineering (IOSR-JCE), 18(1), pp.39-43.
- Vaishali, P. and Bhat, P., 2015. Transform domain techniques for image steganography. International Journal Of Innovative Research In Electrical, Electronics, Instrumentation And Control Engineering, 3(1), pp.65-68.
- http://hdl.handle.net/10603/240087
- Singh, S. and Siddiqui, T.J., 2018. Transform domain techniques for image steganography. In Computer Vision: Concepts, Methodologies, Tools, and Applications (pp. 170-186). IGI Global.
Image steganography is a highly effective technique for secure communication, allowing data to be concealed
within digital images.This paper provides a comparative analysis of various methods proposed by some papers presented, to
enhance the efficiency of image steganographic techniques, with a focus on optimizing data capacity and imperceptibility.
It has been observed that significant improvements in the quality metrics of stego images and their robustness against
attacks can greatly contribute to achieving the objective of secure data hiding. These findings highlight the potential of the
proposed approach to advance secure data transmission.
Keywords :
Steganography, Payload, Discrete Cosine Transform, Singular Value Decomposition, Least Significant Bit.