Skip to main content

Review on Image Steganography Transform Domain Techniques

  • Conference paper
  • First Online:
Intelligent Manufacturing Systems in Industry 4.0 (IPDIMS 2022)

Abstract

In today’s society, data security is of the utmost importance. Securing data by ensuring confidentiality and integrity is crucial. Security of information is essential for transferring confidential data, data storing, and database systems. Steganography is one of the methods of protecting data. As you can see, steganography is the art and science of concealing communication, i.e., encasing the secret message inside another medium, such as images, audio, video, or text. Steganography is a method with several advantages, including high concealment capacity and undetectability. There are different types of steganography. The type of steganography depends on the type of cover object such as text, image, video we use to conceal the secret. Image steganography is hiding the existence of the data using the image as the cover image. Lastly, the parameters Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), and Structured Similarity Index Measure (SSIM) are calculated which give an indication of the efficiency of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sharma P, Sharma A (2018) Robust technique for steganography on Red component using 3-DWTDCT transform. In: 2018 2nd international conference on inventive systems and control (ICISC)

    Google Scholar 

  2. Sheidaee A, Farzinvash L (2017) A novel image steganography method based on DCT and LSB. In: 2017 9th international conference on information and knowledge technology (IKT)

    Google Scholar 

  3. Sun Y, Yu M, Wang J (2020) Research and development of QR code steganography based on JSteg algorithm in DCT domain. In: 2020 IEEE 15th international conference on solid-state and integrated circuit technology

    Google Scholar 

  4. Yadahalli SS, Rege S, Sonkusare R (2020) Implementation and analysis of image steganography using Least Significant Bit and Discrete Wavelet Transform techniques. In: 2020 5th international conference on communication and electronics systems (ICCES)

    Google Scholar 

  5. Sharma VK, Srivastava DK (2017) Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. In: Vishwakarma H, Akashe S (eds) Computing and network sustainability

    Google Scholar 

  6. Nevriyanto A, Sutarno S, Siswanti SD, Erwin E (2018) Image steganography using combine of discrete wavelet transform and singular value decomposition for more robustness and higher peak signal noise ratio. In: 2018 international conference on electrical engineering and computer science (ICECOS)

    Google Scholar 

  7. Jothy N, Anusuyya S (2016) A secure color image steganography using integer wavelet transform. In: 2016 10th international conference on intelligent systems and control (ISCO)

    Google Scholar 

  8. ElSayed A, Elleithy A, Thunga P, Wu Z (2015) Highly secure image steganography algorithm using curvelet transform and DCT encryption. In: 2015 long island systems, applications and technology

    Google Scholar 

  9. Soni A, Jain J, Roshan R (2013) Image steganography using discrete fractional Fourier transform. In: 2013 international conference on intelligent systems and signal processing (ISSP)

    Google Scholar 

  10. Kalitha M, Majumder S (2016) A new steganographic method using Contourlet transform. In: 2016 international conference on signal processing and communication (ICSC)

    Google Scholar 

  11. Kim J, Park H, Park J-I (2017) Image steganography based on block matching in DWT domain. In: 2017 IEEE international symposium on broadband multimedia systems and broadcasting (BMSB)

    Google Scholar 

  12. Tripathi D, Sharma S (2016) A robust 3-SWT multiple image steganography and contrast enhancement technique. In: 2016 international conference on inventive computation technologies (ICICT)

    Google Scholar 

  13. Mudnur SP, Raj Goyal S, Jariwala KN, Patel WD, Ramani B (2018) Hiding the secret image using two cover images for enhancing the robustness of the stego image using Haar DWT and LSB techniques. In: 2018 conference on information and communication technology (CICT)

    Google Scholar 

  14. Yadav S, Yadav P, Tripathi AK (2017) Image steganography on color image using SVD and RSA with 2-1-4-LSB technique. In: 2017 international conference on computation of power, energy information and communication (ICCPEIC)

    Google Scholar 

  15. Kozin A, Papkovskaya O, Kozina M (2016) Steganography method using Hartley transform. In: 2016 13th international conference on modern problems of radio engineering, telecommunications and computer science (TCSET)

    Google Scholar 

  16. Yadav SK, Dixit M (2017) An improved image steganography based on 2-DWT-FFT-SVD on YCBCR color space. In: 2017 international conference on trends in electronics and informatics (ICEI)

    Google Scholar 

  17. Singh YK, Sharma S (2016) Image steganography on gray and color image using DCT enhancement and RSA with LSB method. In: 2016 international conference on inventive computation technologies (ICICT)

    Google Scholar 

  18. Najih MNM, Setiadi DRIM, Rachmawanto EH, Sari CA, Astuti S (2017) An improved secure image hiding technique using PN-sequence based on DCT-OTP. In: 2017 1st international conference on informatics and computational sciences (ICICoS)

    Google Scholar 

  19. Bansal D, Chhikara R (2014) An improved DCT based steganography technique. Int J Comput Appl 102(14)

    Google Scholar 

  20. Emad E, Safey A, Refaat A, Osama Z, Sayed E, Mohamed E (2018) A secure image steganography algorithm based on least significant bit and integer wavelet transform. J Syst Eng Electron 29(3):639–649

    Article  Google Scholar 

  21. Bhatu B, Shah HY (2016) Customized approach to increase capacity and robustness in image steganography. In: 2016 international conference on inventive computation technologies (ICICT)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Gnanitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gnanitha, G., Swetha, A., Sai Teja, G., Sri Vasavi, D., Lakshmi Sirisha, B. (2023). Review on Image Steganography Transform Domain Techniques. In: Deepak, B.B.V.L., Bahubalendruni, M.V.A.R., Parhi, D.R.K., Biswal, B.B. (eds) Intelligent Manufacturing Systems in Industry 4.0. IPDIMS 2022. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-1665-8_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-1665-8_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-1664-1

  • Online ISBN: 978-981-99-1665-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics