Introduction
The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. There are 5 kinds of Steganography: Text, Image, Audio/Video and Protocol (Joshi, R. et al. 2013). The term Steganography refers to the art of covert communications. By implementing steganography, it is possible for Alice to send a secret message to Bob in such a way that no-one else will know that the message exists (Bateman, P. and Schaathun, H. 2008).
Images are considered as the most popular file formats used in steganography. They are known for constituting a non-causal medium, due to the possibility to access any pixel of the image at random. In addition, the hidden information could remain invisible to the eye. However, the image steganography techniques will exploit "holes" in the Human Visual System (Hamid, N. et al. 2012)
Scientific Review
As the computer, the internet and the Digital Signal Processing (DSP) started to boost, steganography has gone digital (Cheddad, A. and Condell, J. 2010). The popular images to try steganography are binary images and 3D images and steganography for such types of images have shown a lot of progress but researchers focus on using grey-scale and colour images to hide data. Grey-scale images are preferred over colour images as it is easy to detect the route of encryption because of the disturbances of correlations between colour components (Li, B. and He, J. 2011).
There are various techniques used for Image steganography which are performed on various formats of images. Some of the techniques include:
Least Significant Bit technique – In this method, the image is scanned row wise and it is encoded in binary. Then, the message is also encoded in binary. The image size and the message size are compared. Once done, a random pixel from the image is chosen and is divided into three parts i.e.
Bibliography: Bateman, P. and Schaathun, H. (2008). Image Steganography And Steganalysis. [online] Retrieved from: http://www.computing.surrey.ac.uk/personal/st/H.Schaathun/projects/Past/phil-msc.pdf [Accessed: 21 Feb 2013]. Li, B. and He, J. (2011). A Survey On Image Steganography And Steganalysis. [online] Retrieved from: http://bit.kuas.edu.tw/~jihmsp/2011/vol2/JIH-MSP-2011-03-005.pdf [Accessed: 21 Feb 2013]. Al-Shatnawi , A. (2012). A New Method In Image Steganography With Improved Image Quality. [online] Retrieved from: http://www.m-hikari.com/ams/ams-2012/ams-77-80-2012/alshatnawiAMS77-80-2012.pdf [Accessed: 21 Feb 2013]. Cheddad, A. and Condell, J. (2010). Digital Image Steganography: Survey And Analysis Of Current Methods. [online] Retrieved from: http://www.abbascheddad.net/Survey.pdf [Accessed: 21 Feb 2013]. Christaline, J. and Vaishali, D. (2011). Image Steganographic Techniques With Improved Embedding Capacity And Robustness. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5972288 [Accessed: 17 Feb 2013]. Gutub, A. et al. (2009). Triple-A: Secure RGB Image Steganography Based On Randomization. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5069356 [Accessed: 21 Feb 2013]. Hamid, N. et al. (2012). Image Steganography Techniques: An Overview. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJCSS/volume6/Issue3/IJCSS-670.pdf [Accessed: 21 Feb 2013]. Hmood, D. et al. (2012). A New Steganographic Method For Embedded Image In Audio File. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJCSS/volume6/Issue2/IJCSS-633.pdf [Accessed: 17 Feb 2013]. Ibrahim, R. and Kuan, T. (2011). Steganography Algorithm To Hide Secret Message Inside An Image. [online] Retrieved from: http://arxiv.org/ftp/arxiv/papers/1112/1112.2809.pdf [Accessed: 17 Feb 2013]. Joshi, R. et al. (2013). Image Steganography. [online] Retrieved from: http://ijarcet.org/index.php/ijarcet/article/view/674/pdf [Accessed: 17 Feb 2013]. Juneja, M. and Sandhu, P. (2009). Designing Of Robust Image Steganography Technique Based On LSB Insertion And Encryption. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5329453 [Accessed: 21 Feb 2013]. Keshari, S. and Modani, G. (2011). Weighted Fractional Fourier Transform based Image Steganography. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6146870 [Accessed: 17 Feb 2013]. Kumar, M. and Newman, R. (2009). J3: High Payload Histogram Neutral JPEG Steganography. [online] Retrieved from: http://www.cise.ufl.edu/~nemo/tmp/j3_5.pdf [Accessed: 21 Feb 2013]. Li, B. et al. (2008). Textural Features Based Universal Steganalysis. [online] Retrieved from: http://144.206.159.178/ft/CONF/16408889/16408927.pdf [Accessed: 17 Feb 2013]. Luo, W. and Huang, J. (2010). Edge Adaptive Image Steganography Based On LSB Matching Revisited. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5411758 [Accessed: 17 Feb 2013]. Nag, A. et al. (2010). A Novel Technique For Image Steganography Based On Block-DCT And Huffman Encoding. [online] Retrieved from: http://arxiv.org/ftp/arxiv/papers/1006/1006.1186.pdf [Accessed: 21 Feb 2013]. Pandian, N. and Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy Using Hufman Encoding. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJIP/volume6/Issue5/IJIP-665.pdf [Accessed: 17 Feb 2013]. Parvez, M. and Gutub, A. (2008). RGB Intensity Based Variable-Bits Image Steganography. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4780862 [Accessed: 21 Feb 2013]. Rao, S. et al. (2011). Secure Image Steganography Based On Randomized Sequence Of Cipher Bits. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5945256 [Accessed: 17 Feb 2013]. Sarreshtedari, S. and Ghaemmaghami, S. (2010). High Capacity Image Steganography In Wavelet Domain. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5421800 [Accessed: 21 Feb 2013]. Singh, P. and Pujara, C. (2012). Comparative Study Of Various Techniques Employ In Image Steganography. [online] Retrieved from: http://www.ijeat.org/attachments/File/v1i5/E0384051512.pdf [Accessed: 17 Feb 2013]. Suresh, K. et al. (2008). Authentication Of Secret Information In Image Steganography. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4766581 [Accessed: 14 Feb 2013]. Yadav, R. et al. (2011). A Novel Approach For Image Steganography In Spatial DoMain Using Last Two Bits Of Pixel Value. [online] Retrieved from: http://cscjournals.org/csc/manuscript/Journals/IJS/volume5/Issue2/IJS-77.pdf [Accessed: 17 Feb 2013]. Yu, J. et al. (2008). A New Image Steganography Based On 2k Correction And Edge-Detection. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4492540&tag=1 [Accessed: 21 Feb 2013]. Zhang, H. et al. (2009). Image Steganography Using Pixel-Value Differencing. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5209914 [Accessed: 21 Feb 2013]. Zhou, Y. and Agaian, S. (2011). Image Encryption Using the Image Steganography Concept And PLIP Model. [online] Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961993 [Accessed: 14 Feb 2013].