OVERVIEW OF STEGANOGRAPHY IN IMAGE

  • Nguyen Dinh Chien Hung Yen University of Technology and Education
  • Nguyen Duc Hau Hung Yen University of Technology and Education
  • Dao Van Hung Hung Yen University of Technology and Education
Keywords: Steganography, Watermarking, image, PSNR, SSIM

Abstract

Steganography is a technique to hide secret data in a digital object such as video, image, audio, databases, DNA sequences, and text,... The main purpose of hiding information is to make it impossible for others to recognize, the robustness, and the amount of information hidden in the digital objects. This paper summarizes the steganographic techniques in digital images as well as some basic concepts in the field of data security and safety through data hiding. Some methods of hiding data in JPEG format are also discussed in this paper. By synthesizing some techniques for hiding information in images, we aim to provide basic knowledge, thereby motivating scientists to research methods to improve the quality andembedded capacity in images and be able to avoid attacks.

References

Alabdali, N., & Alzahrani, S., An overview of steganography through history. Int. J. Sci. Eng. Sci, 2021, 5, pp. 41-44.

Kumar, R., Bansal, S., & Bansal, R. K, Steganography on JPEG Images: Issues and Challenges. In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024, December, pp. 1-5.

Johnson, N. F., & Jajodia, S., Exploring steganography: Seeing the unseen. Computer, 2008, 31(2), pp. 26-34.

Judge, J. C., Steganography: past, present, future (No. UCRL-ID-151879). Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States), 2001.

Swanson, M. D., Kobayashi, M., & Tewfik, A. H., Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 1998, 86(6), pp. 1064-1087.

Wayner, P., Disappearing cryptography: information hiding: steganography and watermarking. Morgan Kaufmann, 2009.

Wolfgang, R. B., Podilchuk, C. I., & Delp, E. J., Perceptual watermarks for digital images and video. Proceedings of the IEEE, 2002, 87(7), pp. 1108-1126.

Din, R., Shakir, A. H., Ali, S. H., Almaliki, A. J. Q., & Utama, S., Exploring Steganographic Techniques for Enhanced Data Protection in Digital Files. International Journal of Advanced Research in Computational Thinking and Data Science, 2024, 1(1), pp. 1-9.

Li, F., Hu, H., Zhu, S., Yan, J., & Ding, J., A verifiable (k, n)-threshold dynamic quantum secret sharing scheme. Quantum Information Processing, 2022, 21(7).

J. Flores‐Escalante, J. Pérez‐Díaz and R. Gómez‐Cárdenas, Design and Implementation of An Electronic Identification Card. Journal Of Applied Research And Technology.

Aravind K. Mikkilineni, Osman Arslan , Pei-Ju Chiang, Roy M. Kumontoy, Jan P. Allebach,George T.-C.Chiu, Edward J. Delp, Printer Forensics using SVM Techniques, This research was supported by a grant from the National Science Foundation, under Award Number 0219893.

M. Wu, E. Tang, and B. Lin, Data hiding in digital binary image, Proc. of 2000 IEEE International Conference on Multimedia and Expo, 2000, vol. 1, pp. 393-396.

G. Liang, S. Wang, and X. Zhang, Steganography in binary image by checking data-carrying eligibility of boundary pixels. Journal of Shanghai University, 2007, vol. 11, no. 3, pp. 272-277.

Jessica Fridrich, Miroslav Goljan, and Rui Du, Reliable detection of lsb steganography in color and Gray scale images. Proc. of 2001 ACM workshop on Multimedia and security: new challenges, ACM Press, 2001, pp. 27-30.

Alvarez, Using extended file information (EXIF) file headers in digital evidence analysis. International Journal of Digital Evidence, Economic Crime Institute (ECI), 2004, 2 (3), pp. 1–5.

V. Lokeswara Reddy, Dr.A.Subramanyam, Dr.P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats”. Int. J. Advanced Networking and Applications 868, 2011, Volume: 02, Issue: 05, Pages: 868-872.

Morkel, T., Eloff, J.H.P., Olivier, M.S.: An Overview of Image Steganography. University of Pretoria, South Africa, 2002.

Wang, H., Wang, S.: Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM, 2004, 47(10).

T. Morkel, JHP Eloff and MS Olivier, “An Overview of Image Steganography,” in Proceeding of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sand to South Africa, June/July 2005.

Eiji Kawaguchi and Richard O. Eason, Principle and applications of bpcs steganography, In Multi-media Systems and Applications, SPIE, 1998, vol. 3528, pp. 464-473.

T. Sharp, An implementation of key-based digital signal steganography. Proc. of the 4th Information Hiding Workshop, Springer, 2001, vol. 2137, pp. 13-26.

J. Mielikainen, Lsb matching revisited. IEEE Signal Processing Letters, 2006, vol. 13, no. 5, pp. 285-287.

X. Li, B. Yang, D. Cheng, and T. Zeng, A generalization of lsb matching. IEEE Signal Processing Letters, 2009, vol. 16, no. 2, pp. 69-72.

D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value diRerencing. Pattern Recognition Letters, 2003, vol. 24, no. 9-10, pp. 1613-1626.

B. Chen and G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Information Theory, 2001, vol. 47, no. 4, pp. 1423-1443.

Qiao, T., Retraint, F., Cogranne, R., & Zitzmann, C., Steganalysis of JSteg algorithm using hypothesis testing theory. EURASIP Journal on Information Security, 2015, 2015(1), 2.

Borghys, D., Bas, P., & Bruyninckx, H., Facing the cover-source mismatch on jphide using training-set design. In Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018, June, pp. 17-22.

A. Westfeld, F5-A steganographic algorithm: high capacity despite better steganalysis, in: Proceedings of Fourth International Work-shop on Information Hiding. Lecture Notes in Computer Science, Pittsburgh, USA, April 2001, vol. 2137, pp. 289–302.

K. Solanki, A. Sarkar, and B. S. Manjunath, Yass: Yet another steganographic scheme that resists blind steganalysis. Proc. of the 9th Information Hiding Workshop, Springer, 2007, vol. 4567, pp. 16-31.

A. A. Abdelwahab, L.A. Hassan, A discrete wavelet transform based technique for image data hiding, in: Proceedings of 25th National Radio Science Conference, NRSC 2008, Egypt, March 18–20, 2008, pp. 1–9.

Setiadi, D. R. I. M., PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 2021, 80(6), pp. 8423-8444.

J. Fridrich, Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. Proc. of the 6th Information Hiding Workshop, Springer, 2004, vol. 3200, pp. 67-81.

Y. Kim, Z. Duric, and D. Richards, Modified matrix encoding for minimal distortion steganography. Proc. of the 8th Information Hiding Workshop, Springer, 2006, vol. 4437, pp. 314-327.

Published
2025-09-19
How to Cite
Nguyen Dinh Chien, Nguyen Duc Hau, & Dao Van Hung. (2025). OVERVIEW OF STEGANOGRAPHY IN IMAGE. Journal of Applied Science and Technology, 47, 59-65. Retrieved from https://jst.utehy.edu.vn/index.php/jst/article/view/819