Open Access   Article Go Back

Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview

Nadish Ayub1 , Arvind Selwal2

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-03 , Page no. 46-50, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si3.4650

Online published on Apr 30, 2018

Copyright © Nadish Ayub, Arvind Selwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nadish Ayub, Arvind Selwal, “Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.46-50, 2018.

MLA Style Citation: Nadish Ayub, Arvind Selwal "Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview." International Journal of Computer Sciences and Engineering 06.03 (2018): 46-50.

APA Style Citation: Nadish Ayub, Arvind Selwal, (2018). Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview. International Journal of Computer Sciences and Engineering, 06(03), 46-50.

BibTex Style Citation:
@article{Ayub_2018,
author = { Nadish Ayub, Arvind Selwal},
title = {Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {06},
Issue = {03},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {46-50},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=316},
doi = {https://doi.org/10.26438/ijcse/v6i3.4650}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.4650}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=316
TI - Image Steganography using Edge Based Data Hiding in Dct Domain: An Overview
T2 - International Journal of Computer Sciences and Engineering
AU - Nadish Ayub, Arvind Selwal
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 46-50
IS - 03
VL - 06
SN - 2347-2693
ER -

           

Abstract

Steganography is the art of concealing secret information in some given information. Steganography hides the existence of the message unlike cryptography which keeps the contents of message secret. Image steganography is the branch of steganography where secret information is hidden inside an image. There are various techniques of image steganography i.e., spatial domain and frequency domain. In this paper, a review of image steganography techniques is presented using qualitative parameters like robustness, embedding capacity and quantitative parameters like PSNR, SNR, MSE are taken into consideration for analyzing the efficiency of various techniques of image steganography. The study reveals that transform domain techniques are more robust than spatial domain techniques even though are more complex than spatial domain techniques. Furthermore, it is observed that edge based data hiding in DCT domain has more embedding capacity and is more robust than spatial domain techniques.

Key-Words / Index Term

Imagesteganography,DCTdomain,datahiding

References

[1] T. Morkel, M. S. Olivier, and S. Africa, “AN OVERVIEW OF IMAGE STEGANOGRAPHY.”
[2] K. N. Brahmateja, G. L. Madhumati, and K. R. K. Rao, “Data Hiding Using EDGE Based Steganography,” vol. 2, no. 11, pp. 285–290, 2012.
[3] A. A. Attaby, M. F. M. Mursi Ahmed, and A. K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3,” Ain Shams Eng. J., 2016.
[4] S. A. El Rahman, “algorithm and steganography tool to hide nuclear reactors,” Comput. Electr. Eng., vol. 0, pp. 1–20, 2016.
[5] S. O.Akinola and A. A.Olatidoye, “On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images,” Int. J. Comput. Sci. Inf. Technol., vol. 7, no. 4, pp. 79–91, 2015.
[6] G. T. Shrivakshan and C. Chandrasekar, “A Comparison of various Edge Detection Techniques used in Image Processing,” Int. J. Comput. Sci. Issues, vol. 9, no. 5, pp. 269–276, 2012.
[7] C. H. Shreya Gupta, Akshay Kalra, “A Hybrid Technique for Spatial Image Steganography,” 3rd Int. Conf. onComputing Sustain. Glob. Dev., pp. 643–647, 2016.
[8] S. Islam, M. R. Modi, and P. Gupta, “Edge-based image steganography,” EURASIP J. Inf. Secur., vol. 2014, no. 1, p. 8, 2014.
[9] S. Sharma and U. Kumar, “Review of Transform Domain Techniques for Image Steganography,” Int. J. Sci. Res. ISSN (Online Index Copernicus Value Impact Factor, vol. 4, no. 5, pp. 194–197, 2015.
[10] M. Jain and S. K. Lenka, “A Review of Digital Image Steganography using LSB and LSB Array,” vol. 11, no. 3, pp. 1820–1824, 2016.
[11] A. S. Kelsey and C. M. Akujuobi, “A Discrete Wavelet Transform Approach for Enhanced Security in Image Steganography,” vol. 5, no. 1, pp. 10–20, 2016.
[12] V. R. Kukapalli, B. T. Rao, and B. S. Reddy, “Image Steganography by Enhanced Pixel Indicator Method Using Most Significant Bit ( MSB ) Compare,” vol. 15, no. 3, pp. 97–101, 2014.
[13] T. Johnson et al., “Improved steganography using enhanced k strange points clustering,” Int. J. Appl. Eng. Res., vol. 11, no. 9, pp. 6881–6885, 2016.
[14] G. Singh, “MRI Medical Image and Steganography,” vol. 4, no. 2, pp. 2–5, 2016.
[15] S. Lahiri, P. Paul, S. Banerjee, S. Mitra, A. Mukhopadhyay, and M. Gangopadhyaya, “Image Steganography On Coloured Images Using Edge Based Data Hiding In DCT Domain,” Inf. Technol. Electron. Mob. Commun. Conf. (IEMCON), 2016 IEEE 7th Annu., 2016.
[16] M. Gunjal and J. Jha, “Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm,” Int. J. Comput. Trends Technol., vol. 11, no. 4, pp. 144–150, 2014.
[17] S. Sugathan, “An improved LSB embedding technique for image steganography,” Proc. 2016 2nd Int. Conf. Appl. Theor. Comput. Commun. Technol. iCATccT 2016, no. 4, pp. 609–612, 2017.
[18] B. S. Champakamala, K. Padmini, R. D. K. A. Professors, and D. Bosco, “Least Significant Bit algorithm for image steganography Overview of Steganography,” Int. J. Adv. Comput. Technol., vol. 3, no. 4, p. 5, 2014.
[19] T. Nadu, “Sobel edge detection technique implementation for image steganography analysis .,” pp. 1–7, 2017.
[20] “A Secure Steganography Technique Using MSB,” vol. 9359, no. 6, pp. 208–214, 2017.
[21] Ammad Ul Islam, Faiza Khalid, Mohsin Shah, Zakir Khan , Toqeer Mahmood3, Adnan Khan Usman Ali2, Muhammad Naeem” An Improved Image Steganography Technique based on MSB using Bit Differencing”,IEEE awe 978-1-5090-2000,2016.